Community Apps

Browse our large and growing catalog of applications to run in your Unraid server. 

Download the Plugin  |  Become a Community Developer


Community-built

All the applications you love—built and maintained by a community member who understands what you need on Unraid. Love a particular app or plugin? Donate directly to the developer to support their work.

Created by a legend

Andrew (aka Squid) has worked tirelessly to build and enhance the experience of Community Apps for users like you. Listen to his story.

Moderated and Vetted

Moderators ensure that apps listed in the store offer a safe, compatible, and consistent experience. Learn more about our guidelines.


CompreFace-GPU's Icon

CompreFace is a leading free and open-source face recognition system 1. Install Unraid Nvidia Plugin (available in the community apps store): https://forums.unraid.net/topic/98978-plugin-nvidia-driver/ 2. You can choose from different GPU Builds: Arcface-R100-GPU, (compreface:0.6.1-arcface-r100-gpu) - The most accurate model MobileNet-GPU, (compreface:0.6.1-mobilenet-gpu) - The fastest model More Infos: https://github.com/exadel-inc/CompreFace/blob/master/custom-builds/README.md Database Configuration by default this App install a PostgresSQL Server. The Data are stored in the given Appdata Folder. If you allready have your own Postgres Server running, you can setup a external Server. 1. Click on "Show more settings" 2. Enter the Username and URL of your PostgresSQL Server. Note: The User has to be SuperUser Rights 3. Set the Variable EXTERNAL_DB to "True" The URL should look like this: jdbc:postgresql://IP:PORT/DATABASENAME like: jdbc:postgresql://192.168.1.254:5432/compreface

Conduit's Icon

Conduit

Productivity

A simple self-contained Rust-based Matrix server. Fully configurable with Environment Variables! (Beta) Check Support Thread for NGINX conf. Conduit is Beta, meaning you can join and participate in most Matrix rooms, but not all features are supported and you might run into bugs from time to time. Conduit is a lightweight open-source server implementation of the Matrix Specification with a focus on easy setup and low system requirements. That means you can make your own Conduit setup in just a few minutes. Conduit keeps things simple, it's a single binary with an embedded database and can be much faster than other server implementations in some cases.

ContainerNursery's Icon

ContainerNursery

Network ServicesProductivity

Puts Docker Containers to sleep and wakes them back up when they're needed. Written in Node.js, this application acts as a HTTP reverse proxy and stops Docker containers which haven't been accessed recently and starts them again when a new request comes in. ContainerNursery also makes sure there are no more active WebSocket connections before stopping the container. To improve the user experience a loading page is presented, which automatically reloads when the containers webserver is ready.

CoreFreq's Icon

CoreFreq is a CPU low level monitoring software designed for x86_64-Processors. You can show Package and Core temps, Hot sensor, Vcore, RAM,... You can also toggle SpeedStep, Clock modulation, Turbo boost, C-States demotion, C1E,... It has also a built in stress test and much, much more. Visit the plugin page after installing and follow the instructions. Open up a unRAID Terminal and type in 'corefreq-cli' (without quotes), hit "F2" or "SPACE" to open up the menu inside CoreFreq. Please note that not every combination of CPU and motherboard is supported! Intel Systems: It is recommended that you append 'nmi_watchdog=0' (without qutoes) for better accuracy to your syslinux configuration (this is only recommended if you are using it directly on Unraid with a physical monitor and keyboard attached, if are using it over SSH it's not necessary because of the added network delay). You can get more details here: https://github.com/cyring/CoreFreq ATTENTION: If you experience any rendom crashes of Unraid or a crash when installing the plugin please make a short post in the support thread and also put you Diagnostics (Tools -> Diagnostics -> Download -> drop the downloaded zip file in the text box) in the post. WARNING: KEEP IN MIND, FREQUENCIES/CORE RATIOS ARE APPLIED IN REAL TIME, PLEASE ONLY CHANGE THE VALUES IF YOU KNOW WHAT YOU ARE DOING!!!

CouchDB-Offical-Docker-v1.x's Icon

CouchDB-Offical-Docker-v1.x

Spants' Repository

Productivity

CouchDB offical docker image Apache CouchDB has a document-oriented NoSQL database architecture and is Open Source.

CouchDB-v2.x's Icon

CouchDB docker image for v2.x Apache CouchDB has a document-oriented NoSQL database architecture and is Open Source.

croodle's Icon

croodle beta

Productivity

Croodle is an end-to-end encrypted web application to schedule a date or to do a poll on a any topic. All data like title, description, number and labels of options, available answers and names of users and their selections are encrypted/decrypted in the browser using strong 256-bit AES encryption.

cryptgeon_redis's Icon

cryptgeon is a secure, open source sharing note or file service inspired by PrivNote. each note has a generated id (256bit) and key 256(bit). The id is used to save & retrieve the note. the note is then encrypted with aes in gcm mode on the client side with the key and then sent to the server. data is stored in memory and never persisted to disk. the server never sees the encryption key and cannot decrypt the contents of the notes even if it tried to. This container was built using SmartPhoneLover's cryptgeon but runs using Redis instead of memcache. Also has extra variables that can be configured. This requires Redis to be already running. I obtained SSL certificate through NGINX proxy manager and let's encrypt.

crypto-exchanges-gateway's Icon

crypto-exchanges-gateway

Crypto Currency, Productivity

<p>Your gateway to the world of crypto !</p> <p><span style="color: rgb(184, 49, 47);"><strong>This project cannot be considered in any way as trading advice.</strong></span></p> <p><br></p> <p>Download config.yml</p> <p>wget -O /mnt/user/appdata/crypto-exchanges-gateway/config.json <a href="https://raw.githubusercontent.com/aloysius-pgast/crypto-exchanges-gateway/master/config/config.sample.json">https://raw.githubusercontent.com/aloysius-pgast/crypto-exchanges-gateway/master/config/config.sample.json</a></p> <p>edit config.json and <strong>change 127.0.0.1 to 0.0.0.0.</strong></p> <p>Add API keys for the supported platform.</p>

cryptomator-webdav's Icon

Cryptomator WebDAV allows you to serve a locally stored Cryptomator vault over a secure WebDAV (https) connection, allowing access to decrypted files through third party WebDav tools such as rclone, Mountain Duck, CyberDuck etc. Setting the Cryptomator Vault Password: The password for the vault can either be set directly through the Cryptomator Vault Password variable, or can be stored in a local file and shared through the Cryptomator Vault Password File setting. Only one is needed. Note: Unraid only shows directories in its drop down by default, manually type the full path to the file in the variable box, e.g. '/mnt/user/appdata/cryptomator-webdav/vault.pass' Optional Signed Certificate: An optional signed certificate can be passed to the container, e.g. from LetsEncrypt. Set the "Optional: Signed Certificate" variable to the full path of your certificate file, containing both your cert and the key in one .pem file. Note: Unraid only shows directories in its drop down by default, manually type the full path to the file in the variable box, e.g. '/mnt/user/appdata/cryptomator-webdav/mycert.pem' File Permissions: Cryptomator-webdav runs as UID:99, GID:100 by default. This can be changed through the CRYPTOMATOR_UID and CRYPTOMATOR_GID variables. Ensure vault files are read and writable by the IDs you set. Ensure any vault password file provided is readable by these IDs. More Secure File Permissions: Most Unraid Community Applications containers run as UID:99, GID:100 In theory this would mean a rouge container could have read access to your encrypted files if the vault was shared with it. To ensure a slightly more secure installation, it is recommended the container application is run as a separate Unraid user id, and vault files are only accessible by this user. For example: Set CRYPTOMATOR_UID to your Unraid user id, e.g. 1000 Ensure all vault files are only readable and writable by this user: chown -R 1000: /path/to/cryptomator/vault chmod -R u+rwX,g-rwx,o-rwx /path/to/cryptomator/vault See the Cryptomator WebDAV github project for more details at https://github.com/greycubesgav/cryptomator-webdav More details about Cryptomator can be found at https://cryptomator.org

cryptpad's Icon

CryptPad is the Zero Knowledge realtime collaborative editor. Before Installing the docker Unraid CLI cd /mnt/user/appdata && mkdir cryptpad && cd cryptpad mkdir -p block customize data datastore config onlyoffice-dist onlyoffice-conf chown -R 4001:4001 block customize data datastore onlyoffice-dist onlyoffice-conf wget -O /mnt/user/appdata/cryptpad/config/config.js https://raw.githubusercontent.com/xwiki-labs/cryptpad/main/config/config.example.js Edit /mnt/user/appdata/cryptpad/config/config.js Change httpUnsafeOrigin:http://UNRAID_IP/DOMAIN:PORT Example httpUnsafeOrigin: 'http://192.168.0.99:3000', In httpAddress: remove // and put httpAddress: '0.0.0.0', More info https://docs.cryptpad.org/fr/admin_guide/installation.html#configure-cryptpad

CSMM-7DtD's Icon

This Docker will install and download CSMM for 7DtD (CatalysmsServerManager). It's a powerfull Server Manager with Server automation, Discord notifications, High ping kicker, Country ban, Player tracking, Ingame commands, Economy system, Discord integration, Support ticket system, Server analytics,... for 7DtD. UPDATE NOTICE: Simply set the 'Force Update' to 'true' and restart the container (don't forget to turn it off after the update).

cura-novnc's Icon

Enjoy Cura directly in your browser with this easy to use Docker container. This template has the minimum variables defined, but you can find additional details on the template at the URLs listed below. https://github.com/helfrichmichael/cura-novnc https://hub.docker.com/r/mikeah/cura-novnc

darktable's Icon

Darktable is an open source photography workflow application and raw developer. A virtual lighttable and darkroom for photographers. It manages your digital negatives in a database, lets you view them through a zoomable lighttable and enables you to develop raw images and enhance them.

databag's Icon

databag

Other, Productivity

Databag is a federated chat app that focuses on user privacy and security. It allows users to communicate with each other in real-time, while keeping their conversations private and secure from third-party surveillance. https://hub.docker.com/r/balzack/databag/

dbgate's Icon

DbGate - (no)SQL database client DbGate is cross-platform database manager. It's designed to be simple to use and effective, when working with more databases simultaneously. But there are also many advanced features like schema compare, visual query designer, chart visualisation or batch export and import. DbGate is licensed under MIT license and is completely free. DbGate web: https://dbgate.org Live demo on: https://demo.dbgate.org Source code on GitHub: https://github.com/dbgate/dbgate/ Supported databases: MySQL, PostgreSQL, SQL Server, Oracle (experimental), MongoDB, Redis, SQLite, Amazon Redshift, CockroachDB Optional Extra Environmental Variables (https://dbgate.org/docs/env-variables.html): WEB_ROOT - if you need to run DbGate in virtual subdirectory (eg. for value /dbadmin , dbgate will be accessible on localhost:3000/dbadmin ) LOGIN , PASSWORD - credentials for accessing web app (obsolete, use LOGINS AND LOGIN_PASSWORD instead) PERMISSIONS - list of comma separated permissions. See also permission list below SHELL_CONNECTION - if true or 1, connections can be defined in shell scripts. Otherwise, only preconfigured connections are allowed. By default, this is not allowed for security reasons. SHELL_SCRIPTING - if true or 1, custom JavaScript shell scripts are allowed. By default, this is not allowed for security reasons. LOGINS - comma delimited list of aditional logins LOGINPASSWORD - password for specified login LOGINPERMISSIONS - list of comma separated permissions for given login. See also permission list below TOKEN_LIFETIME - lifetime of access token. After this time, logged user will be redirected to login page. Default is 1d (means 1 day). Possible are values like 3h (3 hours), 10m (10 minutes), 2d (2 days) SINGLE_CONNECTION - connection id. If defined, only this connection will be available (must be used with SINGLE_DATABASE) SINGLE_DATABASE - database name, only this database will be available. (must be used with SINGLE_CONNECTION) BASIC_AUTH - if true or 1 and LOGIN or LOGINS are defined, baseic authentization of both web and API is used. Otherwise, login form and JWT token base API authentization is used. Basic authentization cannot be used for active directory/LDAP authentization.

Debian-APT-Mirror's Icon

This container will run apt-mirror and Apache2. This allows you to create a local apt mirror for Debian packages. On first run you will have to edit the mirror.list file that lives in your CONFIG_DIR which repositories you want to sync and other settings like how many threads to use for downloading,... Restart the container afterwards (keep an eye on the logs the container will tell you what to do). ATTENTION/WARNING: Keep in mind that the first sync can take very long depending on how much repositories you've selected (stable main contrib non-free: Will take about 200GB of hard drive space!). Update from the mirror files: By default a cron job will run every day at 01:00 which will update your mirror. Mirror address: The default address for the mirror is 'http://ipFROMtheCONTAINER:980' Add something like this to your '/etc/apt/sources.list': 'deb http://ipFROMtheCONTAINER:980/debian stable main contrib non-free'

Debian-Bookworm's Icon

Debian-Bookworm

Productivity, Tools / UtilitiesSystem

This Container is a full Debian Bookworm Xfce4 Desktop environment with a noVNC webGUI and all the basic tools pre-installed. ROOT ACCESS: 1. Open up your WebGUI 2. Open up a terminal 3. Type in 'su' 4. Type in your password that you've set (no screenoutput is shown if you type in passwords in Linux) 5. Press Enter 6. You should now be root. If you want to install some other application you can do that by creating a user.sh and mounting it to the container to /opt/scripts/user.sh (a standard bash script should do the trick). You also can reverse proxy this container with nginx or apache (for more info see the Github/Dockerhub page). Storage Note: All things that are saved in the container should be in the home or a subdirectory in your homefolder, all files that are store outside your homefolder are not persistant and will be wiped if there is an update of the container or you change something in the template.

DirSyncPro's Icon

This Docker will download and install the Runtime and also DirSyncPro with optional encryption by CryFS. You can sync your files to another offsite SMB (is removed in the latest version, please use Unassigned Devices Plugin in Unraid and mount the share with the 'local' option), FTP or WebDAV share also don't forget to specify a path where your source files are. You can also use this tool to duplicate your files on the server to another directory. ENCRYPTION: If you want to use encryption by CryFS you can enable it in the variables below and the mounted folder will be automaticaly encrypted (smb: '/mnt/smb' - ftp: '/mnt/ftp' - webdav: '/mnt/webdav' - local: if you set the type to 'local' you must set the container mountpoint to: '/mnt/local'). Please also note if you set up a encrypted share for the first time the destination folder should be empty since CryFS will create a folder with the basic information for the encryption and all the split files (don't delete any folder since it can corrupt files). The docker will automaticaly create a directory named 'cryfs' in the main directory of DirSyncPro, please copy the 'cryfs.cfg' to a save place since you will need this file and your selected password for CryFS to decrypt the files. Restoring of encrypted files on another computer/server with this Docker: start the container once with CryFS enabled but set no password, the container will start and create the 'cryfs' directory, stop the container copy your cryfs.cfg in the 'cryfs' folder edit the Docker and set the apropriate password and blocksize for the cryfs.cfg and restart the Docker. Now you can sync from/or to your encrypted share again. Also there is a commandline mode without the GUI if you configured all right under the 'Show more settings' section, please be sure that you put your config file in the main directory of the Docker and specify it.

Docker-in-Docker-DinD's Icon

Docker-in-Docker-DinD

Other, Productivity, Tools / UtilitiesUtilities

Unraid template for the official Docker-in-Docker (aka DinD) image. Build docker images directly using your Unraid server as a node i.e. without needing to run a VM - just expose TCP port like you would for a network build node. This is NOT a start-it-and-forget-it set up so PLEASE READ THE NOTES. NOTES: (1) I'm not affiliated with Docker. I just realised nobody created an Unraid template for this really useful image that I have been using for a while (e.g. all my Unraid docker images are built on this via buildx node) so I share this for the community. If Docker ever has an official template then I'll deprecate this one. (2) Must be run in Bridge network mode. Don't bother doing macvlan (aka "br0" / "br1" Unraid docker network), the child dockers will always fail due to lack DNS resolving errors. Don't bother with host network, it crashes my whole docker network every time, requiring a reboot to reset. (3) It is possible to run this rootless / without privileged with the appropriate image tag and config but I could never get it to work properly. Hence, this template requires to run docker with root in privileged mode - with all the usual warning about it. (4) I do NOT recommend mapping /var/lib/docker (i.e. the equivalent to Unraid docker image) unless you actually need it. I don't map it and just delete dangling volume using user scripts. (5) This template has TLS enabled by default and the certs will be saved at wherever you map /certs to on the host. If the /certs is empty, a script will automatically create certificates for you. Port 2376 is used to access docker service through TCP with TLS. As always, buildx will require the full set of certificates to authenticate but note VERY IMPORTANTLY: you have to set it up using DNS name (e.g. by adding the docker name and the Unraid server IP to /etc/hosts and set buildx to use docker_name:2376) and not directly by IP. (5a) Alternatively, once the certificates have been generated (i.e. docker was run at least once), you need to map the FILE /certs/server/openssl.conf to a host file as READ-ONLY (to prevent the docker TLS generator script from overwriting it) + make your appropriate edits + delete the rest of the /certs folder content and let the certificate generator script run again for new certs. You can even do wildcard and stuff like that but I'm not going into details here. (5b) If the above is too complicated for you, just run it without TLS (set DOCKER_TLS_CERTDIR variable to blank). But be mindful that docker has been screaming that this will be deprecated in a (yet-undetermined) future version. And you will need to map 2375 port. (6) You don't need to map both 2375 and 2376. 2375 for non-TLS. 2376 for TLS.

DockerRegistry's Icon

Docker Registry is used to store and distribute Docker images using HTTP API. This allows you host your own private Registry and store your images. Uses official Docker Registry image @ https://hub.docker.com/_/registry/ Configuration /mnt/user/appdata/registry This is where Registry will store it's data. Port 5000 Default connection port

dokuwiki's Icon

Dokuwiki(https://www.dokuwiki.org/dokuwiki/) is a simple to use and highly versatile Open Source wiki software that doesn't require a database. It is loved by users for its clean and readable syntax. The ease of maintenance, backup and integration makes it an administrator's favorite. Built in access controls and authentication connectors make DokuWiki especially useful in the enterprise context and the large number of plugins contributed by its vibrant community allow for a broad range of use cases beyond a traditional wiki.

dolibarr's Icon

dolibarr beta

Productivity

Open Source ERP and CRM for business. Default login is admin/admin. Database creation takes a few minutes on first launch.