Awesome # awesome-tor-logo > Awesome Tor is a curated list of resources, tools, and applications related to the Tor network.

[!NOTE] This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

Before you read, if you want to host a Snowflake bridge in your browser to help users in censored regions bypass censorship, click here. Thank you. ## Contents - Official Manual - Applications - Tails - Tor / Tor Browser - Other applications - Bridges - Bypass Censorship - Public reception, Impact, News, and Legislation - State of the Onion - Whistleblowing ## Official Manual - About Tor Browser - Learn what Tor Browser can do to protect your privacy and anonymity. - Anti-fingerprinting - How Tor Browser mitigates browser fingerprinting. - Bridges - Most Pluggable Transports, such as obfs4, rely on the use of “bridge” relays. - Circumvention - What to do if the Tor network is blocked. - Downloading - How to download Tor Browser. - Installation - Installing Tor Browser. - Known Issues - Issues with Tor. - Make Tor Browser Portable - How to install Tor Browser onto removable media. - Managing Identities - Learn how to control personally identifying information in Tor Browser. - Mobile Tor - Learn about Tor for mobile devices. - Onion Services - Services that are only accessible using Tor. - Plugins, add-ons, and JavaScript - How Tor Browser handles add-ons, plugins, and JavaScript. - Running Tor Browser - Learn how to use Tor Browser for the first time. - Secure Connections - Learn how to protect your data using Tor Browser and HTTPS. - Security Settings - Configuring Tor Browser for security and usability. - Support - How to get help, report a bug, or give feedback. - Troubleshooting - What to do if Tor Browser doesn’t work properly. - Updating - How to update Tor Browser. - Uninstalling - How to remove Tor Browser from your system. ## Applications ### Tails A portable, Debian-based OS that runs from the RAM, leaving no trace. Uses Tor Browser as the primary browser. - Contribute - Documentation - Download - Homepage - How it works - News - Support ### Tor / Tor Browser Open-source web browser that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer, overlay network to conceal location and usage from anyone conducting network surveillance or traffic analysis. - About - Commmunity - Donate - Download - Support - News - Core Tor / Little-t-tor - Installation / Verify source code - Forum / Support ### Other applications - ansible-relayor - This is an ansible role for tor relay operators. - bine - Go library for accessing and embedding Tor clients and servers. - Briar - Peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi, or Tor. - Bulk Tor Exit Exporter - Identify Tor exit nodes by showing exit node IPv4 and fingerprint information. - Chutney - Configures a Tor network, launches and monitors it, and then runs tests on it. - dnscrypt-proxy - A flexible DNS proxy, with support for encrypted DNS protocols. - dos-over-tor - Proof of concept denial of service over Tor stress test tool. - DocTor - A notification service that monitors newly published descriptor information for issues. - eotk - Tool for deploying HTTP/Onion sites to provide official, onion-networking for popular websites. - exitmap - Scanner for Tor to detect bad exits (spoiled onions). - haskell-tor - A Haskell implementation of the Tor protocol. - HTTPS Everywhere - Only allows the browser to connect using HTTPS, built-in Tor. - kalitorify - Shell script to create a transparent proxy through Tor for Kali Linux OS. - Tor Metrics - Adjustable graphs to visualize the statistics of Tor. - multitor - Create multiple Tor instances with load balancing. - mini-tor - Smallest application size while accessing internet content and hidden service content. - node-Tor - JavaScript open-source implementation of the Tor protocol on the server side and browsers. - nyx - CLI interface which includes detailed real-time information about your relay. - offensive-tor-toolkit - Bind/Reverse Shells, SOCKS, etc over Tor in Go. - onion-grater - Whitelisting filter for dangerous Tor control protocol commands. - Onionbalance - A way to load balance onion services across multiple backend Tor instances. - Onionoo - A web-based protocol to learn about currently running Tor relays and bridges. - OnionScan - Help operators of hidden services find and fix operational security issues with their services. - OnionShare - Anonymously share files, host website, and chat using the Tor network. - OONI - Test the blocking of websites and apps. Measure the speed and performance of your network. - Orbot - Tor on Android. - Orfox - Modified Tor browser for Android. Requires Orbot. - php-torcontrol - TorControl is a PHP library to control a Tor server. - Relay Search - Easy way to search for information about relays. - Ricochet Refresh - Ricochet Refresh is a peer-to-peer messenger app that uses Tor to connect clients. - rotating-proxy - Rotating Tor proxy with Docker. - sbws - A Tor bandwidth scanner that generates bandwidth files to be used by Directory Authorities. - Stormy - Stormy is a wizard that helps people create Tor Onion Services with just a few clicks. - setup-tor - Set up your GitHub Actions workflow with a specific version of Tor. - Stem - Stem is a Python controller library for Tor. - Shadow - Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in. - Tallow - A program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. - tor_box - An all-inclusive Tor configuration for Raspberry Pi, that serves as a relay and personal Tor network. - Tor_Onion_Proxy - Provides a .JAR and an .AAR file for embedding Tor into a Java or Android Program. - tor_ssh.sh - Command that allows SSH access using Tor to any server. - tor-browser-selenium - A Python library to automate Tor Browser with Selenium WebDriver. - tor-controller - Run Tor Onion Services on Kubernetes. - tor-hidden-service - Docker container made for Onion Services in v2 or v3. - tor-relay-bootstrap - Script to bootstrap a Debian server to be a set-and-forget Tor relay. - Tor.framework - Tor.framework is the easiest way to embed Tor in your iOS application. - tor.rb - This is a Ruby library for interacting with the Tor anonymity network. - Tor2web - HTTP proxy software that enables access to Tor Hidden Services through common web browsers. - TorBot - Onion site crawler for data collection. - TorChat-Mac - macOS native TorChat client. - TorChat - Decentralized anonymous instant messenger on top of Tor Hidden Services. - TorCheck - Determines if a visitor is using Tor or not. - torDDoS - TorDDos is a Python tool to automatize DDoS attacks on a website from the Tor network. - toriptabkes2 - An anonymizer that sets up iptables and Tor to route all traffic through the Tor network. - torps - The Tor Path Simulator (TorPS) is a tool for efficiently simulating path selection in Tor. - Torsocks - Allows you to use most applications safely with Tor. - Tortilla - Tool that securely, anonymously, and transparently routes all TCP/IP and DNS traffic through Tor. - tun2tor - Rust library that creates a utun (userspace tunnel) interface, and connects it to a stream-based proxy. - txtorcon - An implementation of the control-spec for Tor using the Twisted networking library for Python. - Vanguards - This addon protects against guard discovery and related traffic analysis attacks. - Whonix - OS designed for advanced security and privacy using the desktop-wide use of the Tor network. - ZeroNet - Free and uncensorable websites, using Bitcoin cryptography, the BitTorrent network, and Tor support. ## Bridges - BridgeDB - BridgeDB is a collection of backend servers used to distribute Tor Bridges. - Conjure - Conjure is an anti-censorship tool in the refraction networking (a.k.a. decoy routing) lineage of circumvention systems. - Flash Proxies - Outdated and deprecated bridge type. It is a miniature proxy that runs in a web browser. - fteproxy - Outdated and deprecated bridge type. Tor traffic resembles plain HTTP. The name stands for “Format-Transforming Encryption.” - meek - These pluggable transports make it look like you are browsing a major website instead of using Tor. - obsf2 - Outdated and deprecated bridge type. Predecessor of obsf3. - obsf3 - Outdated and deprecated bridge type. Predecessor of obsf4. - obsf4 - A pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning. - ScrambleSuit - Outdated and deprecated bridge type. A pluggable transport protocol for obfsproxy. It is written in pure Python. - Snowflake - Making your internet activity appear as though you’re using the internet for a regular video or voice call. - Webtunnel - WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. ## Bypass Censorship - Firefly - A proxy software to help circumvent the Great Firewall. - FWlite - An anti-censorship HTTP proxy with built-in shadowsocks support. - Google Fi Wireless - Great phone solution that allows calls, text messaging, and use of cellular data that bypasses China’s Great Firewall. - Lantern - Censorship circumvention tool available for free download on any operating system. - MTProxy - Allows users in censored areas to connect to Telegram. - NaïveProxy - NaïveProxy uses Chromium’s network stack to camouflage traffic with strong censorship resistance and low detectability. - nodeunblocker - Host your copy of nodeunblocker.com using Node.js to bypass censorship on the internet. - PrivadoVPN - VPN that is based in Switzerland and follows Swiss privacy laws. Bypasses even in China. - ProtonVPN - VPN that allows for circumvention of censorship even in China. Free plan bypasses along with multiple servers and protocols. No logs policy. - Private Bridges - Go to I need an alternative way of getting bridges! section. Follow the instructions. - Runet Censorship Bypass - A browser extension for Chromium and Firefox that helps to bypass censorship in Russia. - StegoTorus - A Camouflage Proxy for the Tor Anonymity System. - trojan - An unidentifiable mechanism that helps you bypass GFW. ## Public reception, Impact, News, and Legislation - A close look at the Great Firewall of China - Some information about the censorship of Tor within China. - Analyzing China’s Blocking of Unpublished Tor Bridges - Study on how China blocks unlisted Tor bridges and how to prevent this. - Anarcho-Tech NYC Wiki - Wiki that explains how to stay private and anonymous online. - Anonymity Bibliography - Selected papers in anonymity from 1977 - 2020. - Dropping Docs on Darknet - DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught. - How governments have tried to block Tor - How governments have tried to block Tor by 28c3. - How the Great Firewall of China is blocked in China - Paper explaining how Tor is banned in China along with ways to circumvent it. - Learning more about the GFW’s active probing system - Page about the GFW’s censorship system and how it works. - My Experience With the Great Firewall of China - Blog on CFW of China by an InfoSec professional during one of their visits. - Protocol Misidentification Made Easy with Format-Transforming Encryption - How FTE worked. - Russia Passes Bill Banning Tor - Article about Russia banning VPNs and Tor. - Scaling Tor hidden services - How to scale hidden services. - ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - How ScrambleSuit worked. - Snowden Revelations - The Snowden Revelations explained. - State of the Onion - 2023 - Tor Project’s annual virtual event where we share updates from teams and the community, highlighting their work and the impact it has made across the globe during the year. - StegoTorus: A Camouflage Proxy for the Tor Anonymity System - A paper on how StegoTorus works. - Technical and Legal Overview of Tor - Overview of Tor is presented from the technical perspective and also several legal issues related to its use are analyzed. - Tor after the Snowden revelations - About the Snowden revelations and what Tor will do in 2024. - Tor Browser Afforded CDA Immunity for Dark Web Transactions - Court document about the death of a minor through purchasing narcotics on Tor. - Tor Hidden Services and Deanonyminization - Talk about how Tor and its services can be exploited to expose a user’s information as well as how to prevent attacks. - Tor Overview - Overview of Tor by Privacyguides. - Understanding The Onion Router in 2024 - Explains what Tor is; update for 2024. - What is Tor? - Gives a very good explanation for Tor, Onion Services, and how it promotes human rights. ## State of the Onion - 2024 - State of the Onion report for the year 2024. - 2023 - State of the Onion report for the year 2023. - 2022 - State of the Onion report for the year 2022. - 2021 - State of the Onion report for the year 2021. - 2020 - State of the Onion report for the year 2020. - 2019 - State of the Onion report for the year 2019. ## Whistleblowing - GlobaLeaks - GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. - SecureDrop - SecureDrop is an open-source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. - WikiLeaks - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying, and corruption.

tor.md Github