Community Apps

Browse our large and growing catalog of applications to run in your Unraid server. 

Download the Plugin  |  Become a Community Developer


Community-built

All the applications you love—built and maintained by a community member who understands what you need on Unraid. Love a particular app or plugin? Donate directly to the developer to support their work.

Created by a Legend

Andrew (aka Squid) has worked tirelessly to build and enhance the experience of Community Apps for users like you.

Moderated and Vetted

Moderators ensure that apps listed in the store offer a safe, compatible, and consistent experience. 


PasswordPusherEphemeral's Icon

PasswordPusherEphemeral

Productivity, Security, Tools / UtilitiesUtilities

Ephemeral version requires no other database container! PasswordPusher or PWPush is an opensource application to communicate passwords over the web. Links to passwords expire after a certain number of views and/or time has passed.

Pihole-DoT-DoH's Icon

Pihole-DoT-DoH

Other, Security

Pi-Hole - let's block those pesky ads! Now with DNS-over-HTTPS and DNS-over-TLS! pihole.doh! Don't send your DNS queries in plain text. YOU MUST ASSIGN A STATIC IP TO THE DOCKER FOR PIHOLE TO WORK. You must set both DNS1 and DNS2 variables to 127.1.1.1#5153 (DoH) and/or 127.2.2.2#5253 (DoT). To use just DoH or just DoT, set both DNS1 and DNS2 to the same value. Otherwise, same instructions as official Pi-Hole. NOTE 1: Port 53 can only be used with custom br0/br1 network and a static IP address. NOTE 2: DNS lookup rarely ever works with ports other than 53 i.e. see note above about static IP. NOTE 3: UnRaid network settings DNS server cannot point to a docker IP.

Pihole-DoT-DoH's Icon

Pihole-DoT-DoH

Other, Security

Pi-Hole - let's block those pesky ads! Now with DNS-over-HTTPS and DNS-over-TLS! pihole.doh! Don't send your DNS queries in plain text. YOU MUST ASSIGN A STATIC IP TO THE DOCKER FOR PIHOLE TO WORK. You must set both DNS1 and DNS2 variables to 127.1.1.1#5153 (DoH) and/or 127.2.2.2#5253 (DoT). To use just DoH or just DoT, set both DNS1 and DNS2 to the same value. Otherwise, same instructions as official Pi-Hole. NOTE 1: Port 53 can only be used with custom br0/br1 network and a static IP address. NOTE 2: DNS lookup rarely ever works with ports other than 53 i.e. see note above about static IP. NOTE 3: UnRaid network settings DNS server cannot point to a docker IP. NOTE 4: This should be drop-in replacement for the now deprecated FLIPPINTURT Template.

pihole-unbound's Icon

pihole-unbound

Security

This Docker deployment runs both Pi-Hole and Unbound in a single container. The base image for the container is the official Pi-Hole container, with an extra build step added to install the Unbound resolver directly into to the container based on instructions provided directly by the Pi-Hole team. FYI - This template will install the "one-container" version the developer has built.

pihole-unbound-daily's Icon

pihole-unbound-daily

Security

This template installs Origamiofficial's Pi-Hole & Unbound in the same docker container. His repo aims for daily updates to pihole & unbound, so your install always stays current.

psono's Icon

psono

Security

Secure self-hosted solution for businesses Need settings.yaml in appdata directory (Read First)

pwm's Icon

pwm

Security

PWM is a free and opensource password self-service application enabling end-users to reset their enterprise password themselves.

Shadowsocks's Icon

A secure SOCKS5 proxy. Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship. It was created in 2012 by a Chinese programmer named "clowwindy", and multiple implementations of the protocol have been made available since. Can be used with any SOCKS or Shadowsocks client. Can be seen as a alternative, hard to detect, VPN as well. UNRAID template that JUST WORKS, brought to you by Flight777! Container does not have a WEBUI, as it's very lightweight and all settings are set by the variables. Check the logs to verify it is running correctly

ShadowSocks-Server's Icon

ShadowSocks-Server

Security

Shadowsocks is a tunneling proxy developed to be free, open-source, and mainly used by Chinese people to bypass the Great Firewall restrictions. While using, it covers your browser traffic only, and it is almost impossible to detect and block it. The Docker image is: --Based on Scratch (no OS) for a total size of 3.53MB --Compatible with all the CPU architectures supported by Docker: linux/amd64, linux/386, linux/arm64, linux/arm/v6, linux/arm/v7, linux/s390x, linux/ppc64le and linux/riscv64 --Shadowsocks is implemented in Go and compiled statically using Go 1.16

Shapeshifter-Obfuscator's Icon

Shapeshifter-Obfuscator

Security

Shapeshifter-Obfuscator is a dockerized implementation of shapeshifter-dispatcher provided by The Operator Foundation. The shapeshifter suite provides command-line proxy and obfuscation tools that effectively modify packets to evade advanced IDS systems. This container is targeted at advanced users and provides no graphical user interface. Refer to the shapeshifter-dispatcher documentation on GitHub to learn more about the different proxy modes and transports supported by this tool. https://github.com/OperatorFoundation/shapeshifter-dispatcher

signserver-ce's Icon

SignServer CE: Open source, PKI-based signing software to sign code, documents, timestamps and more. Unofficial Community Application not endorsed or maintained by SignServer or KeyFactor. For additional details see the following URL: https://hub.docker.com/r/keyfactor/signserver-ce/

SuperTokens---MySQL's Icon

Open source alternative to Auth0 / Firebase Auth / AWS Cognito. Add secure login and session management to your apps. Additional options can be added via environmental variables or a mounted config file: https://github.com/supertokens/supertokens-docker-mysql/blob/master/README.md

SuperTokens---PostgreSQL's Icon

SuperTokens---PostgreSQL

Other, Productivity, Security, Tools / UtilitiesUtilities

Open source alternative to Auth0 / Firebase Auth / AWS Cognito. Add secure login and session management to your apps. Additional options can be added via environmental variables or a mounted config file: https://github.com/supertokens/supertokens-docker-postgresql/blob/master/README.md

Vault's Icon

Manage access to secrets and protect sensitive data with identity-based security. config.hcl: ui = "true" listener "tcp" { address = "0.0.0.0:8200" tls_disable = "true" } storage "file" { path = "/vault/file" } api_addr = "http://0.0.0.0:8200" disable_mlock = "true"

zitadel's Icon

zitadel

Security

ZITADEL as identity experience platform provides all the features for identity management, secure authentication, and access management for your customers, employees, devices or services. Our platform makes it easy to deploy a hosted, multi-factor secured login, offer single sign-on, allow users to bring existing identities, integrate with our APIs, and keep informed with our event-based audit trail. Working with Postgres 16 and 17. Please replace --masterkey “MasterkeyNeedsToHave32Characters” in Post Arguments with a safe one. Default username: [email protected] Default password: Password1! In the above username, replace localhost with your configured external domain, if any. e.g. with [email protected]