190 lines
32 KiB
Plaintext
190 lines
32 KiB
Plaintext
[38;5;14m[1m![0m[38;5;12mAwesome[39m[38;5;14m[1m (https://awesome.re/badge.svg)[0m[38;5;12m (https://awesome.re)[39m
|
||
[38;5;12m [39m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mawesome-tor-logo[0m[38;5;14m[1m[4m (https://github.com/Polycarbohydrate/awesome-tor/assets/169401794/d8c7415e-1874-49f5-a1c6-04b3a8aa689f)[0m[38;2;255;187;0m[1m[4m (https://www.torproject.org)[0m
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mAwesome Tor is a curated list of resources, tools, and applications related to the Tor network.[39m
|
||
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;14m[1m!NOTE[0m[38;5;12m [39m
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mThis product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.[39m
|
||
|
||
[38;5;12mTor[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12moverlay[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12menabling[39m[38;5;12m [39m[38;5;12manonymous[39m[38;5;12m [39m[38;5;12mcommunication.[39m[38;5;12m [39m[38;5;12mBuilt[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mopen-source[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12mseven[39m[38;5;12m [39m[38;5;12mthousand[39m[38;5;12m [39m[38;5;12mvolunteer-operated[39m[38;5;12m [39m[38;5;12mrelays[39m[38;5;12m [39m[38;5;12mworldwide,[39m[38;5;12m [39m[38;5;12musers[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mInternet[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mrouted[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mrandom[39m[38;5;12m [39m[38;5;12mpath[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m
|
||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mnetwork.[39m
|
||
|
||
[38;5;12mBefore you read, if you want to host a Snowflake bridge in your browser to help users in censored regions bypass censorship, [39m[38;5;14m[1mclick here[0m[38;5;12m (https://polycarbohydrate.github.io/awesome-tor/selfhost-snowflake). Thank you.[39m
|
||
[38;2;255;187;0m[4mContents[0m
|
||
[38;5;12m- [39m[38;5;14m[1mOfficial Manual[0m[38;5;12m (#official-manual)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mApplications[0m[38;5;12m (#applications)[39m
|
||
[38;5;12m - [39m[38;5;14m[1mTails[0m[38;5;12m (#tails)[39m
|
||
[38;5;12m - [39m[38;5;14m[1mTor / Tor Browser[0m[38;5;12m (#tor--tor-browser)[39m
|
||
[38;5;12m - [39m[38;5;14m[1mOther applications[0m[38;5;12m (#other-applications)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mBridges[0m[38;5;12m (#bridges)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mBypass Censorship[0m[38;5;12m (#bypass-censorship)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mPublic reception, Impact, News, and Legislation[0m[38;5;12m (#public-reception-impact-news-and-legislation)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mState of the Onion[0m[38;5;12m (#state-of-the-onion)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mWhistleblowing[0m[38;5;12m (#whistleblowing)[39m
|
||
[38;2;255;187;0m[4mOfficial Manual[0m
|
||
[38;5;12m- [39m[38;5;14m[1mAbout Tor Browser[0m[38;5;12m (https://tb-manual.torproject.org/about/) - Learn what Tor Browser can do to protect your privacy and anonymity.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mAnti-fingerprinting[0m[38;5;12m (https://tb-manual.torproject.org/anti-fingerprinting/) - How Tor Browser mitigates browser fingerprinting.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mBridges[0m[38;5;12m (https://tb-manual.torproject.org/bridges/) - Most Pluggable Transports, such as obfs4, rely on the use of "bridge" relays.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCircumvention[0m[38;5;12m (https://tb-manual.torproject.org/circumvention/) - What to do if the Tor network is blocked.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDownloading[0m[38;5;12m (https://tb-manual.torproject.org/downloading/) - How to download Tor Browser.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mInstallation[0m[38;5;12m (https://tb-manual.torproject.org/installation/) - Installing Tor Browser.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mKnown Issues[0m[38;5;12m (https://tb-manual.torproject.org/known-issues/) - Issues with Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mMake Tor Browser Portable[0m[38;5;12m (https://tb-manual.torproject.org/make-tor-portable/) - How to install Tor Browser onto removable media.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mManaging Identities[0m[38;5;12m (https://tb-manual.torproject.org/managing-identities/) - Learn how to control personally identifying information in Tor Browser.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mMobile Tor[0m[38;5;12m (https://tb-manual.torproject.org/mobile-tor/) - Learn about Tor for mobile devices.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOnion Services[0m[38;5;12m (https://tb-manual.torproject.org/onion-services/) - Services that are only accessible using Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mPlugins, add-ons, and JavaScript[0m[38;5;12m (https://tb-manual.torproject.org/plugins/) - How Tor Browser handles add-ons, plugins, and JavaScript.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mRunning Tor Browser[0m[38;5;12m (https://tb-manual.torproject.org/running-tor-browser/) - Learn how to use Tor Browser for the first time.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSecure Connections[0m[38;5;12m (https://tb-manual.torproject.org/secure-connections/) - Learn how to protect your data using Tor Browser and HTTPS.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSecurity Settings[0m[38;5;12m (https://tb-manual.torproject.org/security-settings/) - Configuring Tor Browser for security and usability.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSupport[0m[38;5;12m (https://tb-manual.torproject.org/support/) - How to get help, report a bug, or give feedback.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTroubleshooting[0m[38;5;12m (https://tb-manual.torproject.org/troubleshooting/) - What to do if Tor Browser doesn't work properly.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mUpdating[0m[38;5;12m (https://tb-manual.torproject.org/updating/) - How to update Tor Browser.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mUninstalling[0m[38;5;12m (https://tb-manual.torproject.org/uninstalling/) - How to remove Tor Browser from your system.[39m
|
||
[38;2;255;187;0m[4mApplications[0m
|
||
[38;2;255;187;0m[4mTails[0m
|
||
[48;2;30;30;40m[38;5;13m[3mA portable, Debian-based OS that runs from the RAM, leaving no trace. Uses Tor Browser as the primary browser.[0m
|
||
[38;5;12m- [39m[38;5;14m[1mContribute[0m[38;5;12m (https://tails.net/contribute/index.en.html)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDocumentation[0m[38;5;12m (https://tails.net/doc/index.en.html)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDownload[0m[38;5;12m (https://tails.net/install/index.en.html)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mHomepage[0m[38;5;12m (https://tails.net/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mHow it works[0m[38;5;12m (https://tails.net/about/index.en.html)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mNews[0m[38;5;12m (https://tails.net/news/index.en.html)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSupport[0m[38;5;12m (https://tails.net/support/index.en.html)[39m
|
||
[38;2;255;187;0m[4mTor / Tor Browser[0m
|
||
[48;2;30;30;40m[38;5;13m[3mOpen-source web browser that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer, overlay network to conceal location and usage from anyone conducting network surveillance or traffic analysis.[0m
|
||
[38;5;12m- [39m[38;5;14m[1mAbout[0m[38;5;12m (https://www.torproject.org/about/history/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCommmunity[0m[38;5;12m (https://community.torproject.org/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDonate[0m[38;5;12m (https://donate.torproject.org/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDownload[0m[38;5;12m (https://www.torproject.org/download/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSupport[0m[38;5;12m (https://support.torproject.org/)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mNews[0m[38;5;12m (https://blog.torproject.org/)[39m
|
||
[38;5;12m- Core Tor / Little-t-tor[39m
|
||
[38;5;12m - [39m[38;5;14m[1mInstallation / Verify source code[0m[38;5;12m (https://support.torproject.org/little-t-tor/)[39m
|
||
[38;5;12m - [39m[38;5;14m[1mForum / Support[0m[38;5;12m (https://forum.torproject.org/c/support/core-tor/18)[39m
|
||
[38;2;255;187;0m[4mOther applications[0m
|
||
[38;5;12m- [39m[38;5;14m[1mansible-relayor[0m[38;5;12m (https://github.com/nusenu/ansible-relayor) - This is an ansible role for tor relay operators.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mbine[0m[38;5;12m (https://github.com/cretz/bine) - Go library for accessing and embedding Tor clients and servers.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mBriar[0m[38;5;12m (https://briarproject.org/) - Peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi, or Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mBulk Tor Exit Exporter[0m[38;5;12m (https://check.torproject.org/api/bulk) - Identify Tor exit nodes by showing exit node IPv4 and fingerprint information.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mChutney[0m[38;5;12m (https://gitlab.torproject.org/tpo/core/chutney/) - Configures a Tor network, launches and monitors it, and then runs tests on it.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mdnscrypt-proxy[0m[38;5;12m (https://github.com/DNSCrypt/dnscrypt-proxy) - A flexible DNS proxy, with support for encrypted DNS protocols.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mdos-over-tor[0m[38;5;12m (https://github.com/skizap/dos-over-tor) - Proof of concept denial of service over Tor stress test tool. [39m
|
||
[38;5;12m- [39m[38;5;14m[1mDocTor[0m[38;5;12m (https://gitlab.torproject.org/tpo/network-health/doctor/) - A notification service that monitors newly published descriptor information for issues.[39m
|
||
[38;5;12m- [39m[38;5;14m[1meotk[0m[38;5;12m (https://github.com/alecmuffett/eotk) - Tool for deploying HTTP/Onion sites to provide official, onion-networking for popular websites.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mexitmap[0m[38;5;12m (https://www.cs.kau.se/philwint/spoiled_onions/) - Scanner for Tor to detect bad exits (spoiled onions).[39m
|
||
[38;5;12m- [39m[38;5;14m[1mhaskell-tor[0m[38;5;12m (https://github.com/GaloisInc/haskell-tor) - A Haskell implementation of the Tor protocol.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mHTTPS Everywhere[0m[38;5;12m (https://www.eff.org/https-everywhere) - Only allows the browser to connect using HTTPS, built-in Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mkalitorify[0m[38;5;12m (https://github.com/brainfucksec/kalitorify) - Shell script to create a transparent proxy through Tor for Kali Linux OS.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor Metrics[0m[38;5;12m (https://metrics.torproject.org/) - Adjustable graphs to visualize the statistics of Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mmultitor[0m[38;5;12m (https://github.com/trimstray/multitor) - Create multiple Tor instances with load balancing.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mmini-tor[0m[38;5;12m (https://github.com/wbenny/mini-tor) - Smallest application size while accessing internet content and hidden service content.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mnode-Tor[0m[38;5;12m (https://github.com/Ayms/node-Tor) - JavaScript open-source implementation of the Tor protocol on the server side and browsers.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mnyx[0m[38;5;12m (https://nyx.torproject.org/) - CLI interface which includes detailed real-time information about your relay.[39m
|
||
[38;5;12m- [39m[38;5;14m[1moffensive-tor-toolkit[0m[38;5;12m (https://github.com/atorrescogollo/offensive-tor-toolkit) - Bind/Reverse Shells, SOCKS, etc over Tor in Go.[39m
|
||
[38;5;12m- [39m[38;5;14m[1monion-grater[0m[38;5;12m (https://github.com/Whonix/onion-grater) - Whitelisting filter for dangerous Tor control protocol commands.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOnionbalance[0m[38;5;12m (https://onionbalance.readthedocs.io/en/latest/) - A way to load balance onion services across multiple backend Tor instances.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOnionoo[0m[38;5;12m (https://metrics.torproject.org/onionoo.html) - A web-based protocol to learn about currently running Tor relays and bridges.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOnionScan[0m[38;5;12m (https://onionscan.org/) - Help operators of hidden services find and fix operational security issues with their services.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOnionShare[0m[38;5;12m (https://onionshare.org/) - Anonymously share files, host website, and chat using the Tor network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOONI[0m[38;5;12m (https://ooni.org/) - Test the blocking of websites and apps. Measure the speed and performance of your network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOrbot[0m[38;5;12m (https://guardianproject.info/apps/org.torproject.android/) - Tor on Android.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mOrfox[0m[38;5;12m (https://guardianproject.info/apps/info.guardianproject.orfox/) - Modified Tor browser for Android. Requires Orbot.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mphp-torcontrol[0m[38;5;12m (https://github.com/dunglas/php-torcontrol) - TorControl is a PHP library to control a Tor server.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mRelay Search[0m[38;5;12m (https://metrics.torproject.org/rs.html) - Easy way to search for information about relays.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mRicochet Refresh[0m[38;5;12m (https://www.ricochetrefresh.net/) - Ricochet Refresh is a peer-to-peer messenger app that uses Tor to connect clients.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mrotating-proxy[0m[38;5;12m (https://github.com/mattes/rotating-proxy) - Rotating Tor proxy with Docker.[39m
|
||
[38;5;12m- [39m[38;5;14m[1msbws[0m[38;5;12m (https://gitlab.torproject.org/tpo/network-health/sbws) - A Tor bandwidth scanner that generates bandwidth files to be used by Directory Authorities.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mStormy[0m[38;5;12m (https://github.com/glamrock/stormy) - Stormy is a wizard that helps people create Tor Onion Services with just a few clicks.[39m
|
||
[38;5;12m- [39m[38;5;14m[1msetup-tor[0m[38;5;12m (https://github.com/tor-actions/setup-tor) - Set up your GitHub Actions workflow with a specific version of Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mStem[0m[38;5;12m (https://stem.torproject.org/) - Stem is a Python controller library for Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mShadow[0m[38;5;12m (https://shadow.github.io/) - Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTallow[0m[38;5;12m (https://github.com/basil00/TorWall) - A program that redirects all outbound traffic from a Windows machine via the Tor anonymity network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor_box[0m[38;5;12m (https://github.com/CMoncur/tor_box) - An all-inclusive Tor configuration for Raspberry Pi, that serves as a relay and personal Tor network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor_Onion_Proxy[0m[38;5;12m (https://github.com/thaliproject/Tor_Onion_Proxy_Library) - Provides a .JAR and an .AAR file for embedding Tor into a Java or Android Program.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor_ssh.sh[0m[38;5;12m (https://gitlab.com/grownetics/devops/blob/master/tor_ssh.sh) - Command that allows SSH access using Tor to any server.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor-browser-selenium[0m[38;5;12m (https://github.com/webfp/tor-browser-selenium) - A Python library to automate Tor Browser with Selenium WebDriver.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor-controller[0m[38;5;12m (https://github.com/kragniz/tor-controller) - Run Tor Onion Services on Kubernetes.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor-hidden-service[0m[38;5;12m (https://hub.docker.com/r/goldy/tor-hidden-service) - Docker container made for Onion Services in v2 or v3.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor-relay-bootstrap[0m[38;5;12m (https://github.com/coldhakca/tor-relay-bootstrap) - Script to bootstrap a Debian server to be a set-and-forget Tor relay.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor.framework[0m[38;5;12m (https://github.com/iCepa/Tor.framework) - Tor.framework is the easiest way to embed Tor in your iOS application.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtor.rb[0m[38;5;12m (https://github.com/dryruby/tor.rb) - This is a Ruby library for interacting with the Tor anonymity network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor2web[0m[38;5;12m (https://github.com/tor2web/Tor2web) - HTTP proxy software that enables access to Tor Hidden Services through common web browsers.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTorBot[0m[38;5;12m (https://github.com/DedSecInside/TorBot) - Onion site crawler for data collection.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTorChat-Mac[0m[38;5;12m (https://github.com/javerous/TorChat-Mac) - macOS native TorChat client.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTorChat[0m[38;5;12m (https://github.com/prof7bit/TorChat) - Decentralized anonymous instant messenger on top of Tor Hidden Services.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTorCheck[0m[38;5;12m (https://check.torproject.org/) - Determines if a visitor is using Tor or not.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtorDDoS[0m[38;5;12m (https://github.com/r3nt0n/torDDoS) - TorDDos is a Python tool to automatize DDoS attacks on a website from the Tor network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtoriptabkes2[0m[38;5;12m (https://github.com/ruped24/toriptables2) - An anonymizer that sets up iptables and Tor to route all traffic through the Tor network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtorps[0m[38;5;12m (https://github.com/torps/torps) - The Tor Path Simulator (TorPS) is a tool for efficiently simulating path selection in Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTorsocks[0m[38;5;12m (https://gitlab.torproject.org/tpo/core/torsocks/) - Allows you to use most applications safely with Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTortilla[0m[38;5;12m (https://www.crowdstrike.com/resources/community-tools/tortilla-tool/) - Tool that securely, anonymously, and transparently routes all TCP/IP and DNS traffic through Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtun2tor[0m[38;5;12m (https://github.com/iCepa/tun2tor) - Rust library that creates a utun (userspace tunnel) interface, and connects it to a stream-based proxy.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtxtorcon[0m[38;5;12m (https://txtorcon.readthedocs.io/en/latest/) - An implementation of the control-spec for Tor using the Twisted networking library for Python.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mVanguards[0m[38;5;12m (https://github.com/mikeperry-tor/vanguards) - This addon protects against guard discovery and related traffic analysis attacks.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mWhonix[0m[38;5;12m (https://www.whonix.org/) - OS designed for advanced security and privacy using the desktop-wide use of the Tor network.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mZeroNet[0m[38;5;12m (https://zeronet.io/) - Free and uncensorable websites, using Bitcoin cryptography, the BitTorrent network, and Tor support.[39m
|
||
[38;2;255;187;0m[4mBridges[0m
|
||
[38;5;12m- [39m[38;5;14m[1mBridgeDB[0m[38;5;12m (https://pythonhosted.org/bridgedb/) - BridgeDB is a collection of backend servers used to distribute Tor Bridges.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mConjure[0m[38;5;12m (https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/conjure) - Conjure is an anti-censorship tool in the refraction networking (a.k.a. decoy routing) lineage of circumvention systems.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mFlash Proxies[0m[38;5;12m (https://crypto.stanford.edu/flashproxy/) - Outdated and deprecated bridge type. It is a miniature proxy that runs in a web browser.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mfteproxy[0m[38;5;12m (https://fteproxy.org/) - Outdated and deprecated bridge type. Tor traffic resembles plain HTTP. The name stands for "Format-Transforming Encryption."[39m
|
||
[38;5;12m- [39m[38;5;14m[1mmeek[0m[38;5;12m (https://support.torproject.org/glossary/meek/) - These pluggable transports make it look like you are browsing a major website instead of using Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mobsf2[0m[38;5;12m (https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/trac/-/issues/10314) - Outdated and deprecated bridge type. Predecessor of obsf3.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mobsf3[0m[38;5;12m (https://support.torproject.org/glossary/obfs3/) - Outdated and deprecated bridge type. Predecessor of obsf4.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mobsf4[0m[38;5;12m (https://support.torproject.org/glossary/obfs4/) - A pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mScrambleSuit[0m[38;5;12m (https://github.com/NullHypothesis/scramblesuit) - Outdated and deprecated bridge type. A pluggable transport protocol for obfsproxy. It is written in pure Python.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSnowflake[0m[38;5;12m (https://snowflake.torproject.org/) - Making your internet activity appear as though you're using the internet for a regular video or voice call.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mWebtunnel[0m[38;5;12m (https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/) - WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT.[39m
|
||
[38;2;255;187;0m[4mBypass Censorship[0m
|
||
[38;5;12m- [39m[38;5;14m[1mFirefly[0m[38;5;12m (https://github.com/yinghuocho/firefly-proxy) - A proxy software to help circumvent the Great Firewall.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mFWlite[0m[38;5;12m (https://github.com/v3aqb/fwlite) - An anti-censorship HTTP proxy with built-in shadowsocks support.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mGoogle Fi Wireless[0m[38;5;12m (https://fi.google.com/) - Great phone solution that allows calls, text messaging, and use of cellular data that bypasses China's Great Firewall.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mLantern[0m[38;5;12m (https://github.com/getlantern/lantern) - Censorship circumvention tool available for free download on any operating system.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mMTProxy[0m[38;5;12m (https://github.com/TelegramMessenger/MTProxy) - Allows users in censored areas to connect to Telegram.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mNaïveProxy[0m[38;5;12m (https://github.com/klzgrad/naiveproxy) - NaïveProxy uses Chromium's network stack to camouflage traffic with strong censorship resistance and low detectability.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mnodeunblocker[0m[38;5;12m (https://github.com/nfriedly/nodeunblocker.com) - Host your copy of nodeunblocker.com using Node.js to bypass censorship on the internet.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mPrivadoVPN[0m[38;5;12m (https://privadovpn.com/) - VPN that is based in Switzerland and follows Swiss privacy laws. Bypasses even in China.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mProtonVPN[0m[38;5;12m (https://protonvpn.com/) - VPN that allows for circumvention of censorship even in China. Free plan bypasses along with multiple servers and protocols. No logs policy.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mPrivate Bridges[0m[38;5;12m (https://bridges.torproject.org/) - Go to [39m[48;5;235m[38;5;249mI need an alternative way of getting bridges![49m[39m[38;5;12m section. Follow the instructions.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mRunet Censorship Bypass[0m[38;5;12m (https://github.com/anticensority/runet-censorship-bypass) - A browser extension for Chromium and Firefox that helps to bypass censorship in Russia.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mStegoTorus[0m[38;5;12m (https://github.com/SRI-CSL/stegotorus) - A Camouflage Proxy for the Tor Anonymity System.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mtrojan[0m[38;5;12m (https://github.com/trojan-gfw/trojan) - An unidentifiable mechanism that helps you bypass GFW.[39m
|
||
[38;2;255;187;0m[4mPublic reception, Impact, News, and Legislation[0m
|
||
[38;5;12m- [39m[38;5;14m[1mA close look at the Great Firewall of China[0m[38;5;12m (https://blog.torproject.org/closer-look-great-firewall-china/) - Some information about the censorship of Tor within China.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mAnalyzing China's Blocking of Unpublished Tor Bridges[0m[38;5;12m (https://www.usenix.org/conference/foci18/presentation/dunna) - Study on how China blocks unlisted Tor bridges and how to prevent this.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mAnarcho-Tech NYC Wiki[0m[38;5;12m (https://github.com/AnarchoTechNYC/meta/wiki) - Wiki that explains how to stay private and anonymous online.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mAnonymity Bibliography[0m[38;5;12m (https://www.freehaven.net/anonbib/) - Selected papers in anonymity from 1977 - 2020.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDropping Docs on Darknet[0m[38;5;12m (https://www.youtube.com/watch?v=eQ2OZKitRwc) - DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mHow governments have tried to block Tor[0m[38;5;12m (https://www.youtube.com/watch?v=DX46Qv_b7F4) - How governments have tried to block Tor by 28c3.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mHow the Great Firewall of China is blocked in China[0m[38;5;12m (https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf) - Paper explaining how Tor is banned in China along with ways to circumvent it.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mLearning more about the GFW's active probing system[0m[38;5;12m (https://blog.torproject.org/learning-more-about-gfws-active-probing-system/) - Page about the GFW's censorship system and how it works.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mMy Experience With the Great Firewall of China[0m[38;5;12m (http://blog.zorinaq.com/my-experience-with-the-great-firewall-of-china/) - Blog on CFW of China by an InfoSec professional during one of their visits.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mProtocol Misidentification Made Easy with Format-Transforming Encryption[0m[38;5;12m (https://kpdyer.com/publications/ccs2013-fte.pdf) - How FTE worked.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mRussia Passes Bill Banning Tor[0m[38;5;12m (https://www.themoscowtimes.com/2021/12/08/russia-blocks-tor-anonymity-service-a75760) - Article about Russia banning VPNs and Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mScaling Tor hidden services[0m[38;5;12m (https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/) - How to scale hidden services.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship[0m[38;5;12m (http://arxiv.org/pdf/1305.3199) - How ScrambleSuit worked.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSnowden Revelations[0m[38;5;12m (https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded) - The Snowden Revelations explained.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mState[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mOnion[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1m2023[0m[38;5;12m [39m[38;5;12m(https://blog.torproject.org/event/state-of-the-onion-2023/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mTor[39m[38;5;12m [39m[38;5;12mProject's[39m[38;5;12m [39m[38;5;12mannual[39m[38;5;12m [39m[38;5;12mvirtual[39m[38;5;12m [39m[38;5;12mevent[39m[38;5;12m [39m[38;5;12mwhere[39m[38;5;12m [39m[38;5;12mwe[39m[38;5;12m [39m[38;5;12mshare[39m[38;5;12m [39m[38;5;12mupdates[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcommunity,[39m[38;5;12m [39m[38;5;12mhighlighting[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mimpact[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mmade[39m[38;5;12m [39m[38;5;12macross[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mglobe[39m
|
||
[38;5;12mduring[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12myear.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mStegoTorus: A Camouflage Proxy for the Tor Anonymity System[0m[38;5;12m (https://www.freehaven.net/anonbib/cache/ccs2012-stegotorus.pdf) - A paper on how StegoTorus works.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTechnical and Legal Overview of Tor[0m[38;5;12m (https://ccdcoe.org/uploads/2018/10/TOR_Anonymity_Network.pdf) - Overview of Tor is presented from the technical perspective and also several legal issues related to its use are analyzed.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor after the Snowden revelations[0m[38;5;12m (https://blog.torproject.org/tor-in-2023/) - About the Snowden revelations and what Tor will do in 2024. [39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor Browser Afforded CDA Immunity for Dark Web Transactions[0m[38;5;12m (https://www.govinfo.gov/content/pkg/USCOURTS-utd-2_18-cv-00712/pdf/USCOURTS-utd-2_18-cv-00712-0.pdf) - Court document about the death of a minor through purchasing narcotics on Tor.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor Hidden Services and Deanonyminization[0m[38;5;12m (https://www.youtube.com/watch?v=HQXRURfrf8w) - Talk about how Tor and its services can be exploited to expose a user's information as well as how to prevent attacks.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTor Overview[0m[38;5;12m (https://www.privacyguides.org/en/advanced/tor-overview/) - Overview of Tor by Privacyguides.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mUnderstanding The Onion Router in 2024[0m[38;5;12m (https://www.privacyjournal.net/privacy/tor-network/) - Explains what Tor is; update for 2024.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mWhat is Tor?[0m[38;5;12m (https://www.amnesty.org/en/latest/campaigns/2024/02/what-is-tor-and-how-does-it-advance-human-rights/) - Gives a very good explanation for Tor, Onion Services, and how it promotes human rights.[39m
|
||
[38;2;255;187;0m[4mState of the Onion[0m
|
||
[38;5;12m- [39m[38;5;14m[1m2024[0m[38;5;12m (https://blog.torproject.org/state-of-the-onion-2024/) - State of the Onion report for the year 2024.[39m
|
||
[38;5;12m- [39m[38;5;14m[1m2023[0m[38;5;12m (https://blog.torproject.org/state-of-the-onion-2023/) - State of the Onion report for the year 2023.[39m
|
||
[38;5;12m- [39m[38;5;14m[1m2022[0m[38;5;12m (https://blog.torproject.org/state-of-the-onion-2022/) - State of the Onion report for the year 2022.[39m
|
||
[38;5;12m- [39m[38;5;14m[1m2021[0m[38;5;12m (https://blog.torproject.org/state-of-the-onion-2021/) - State of the Onion report for the year 2021.[39m
|
||
[38;5;12m- [39m[38;5;14m[1m2020[0m[38;5;12m (https://blog.torproject.org/state-of-the-onion-2020/) - State of the Onion report for the year 2020.[39m
|
||
[38;5;12m- [39m[38;5;14m[1m2019[0m[38;5;12m (https://www.youtube.com/watch?v=W0NR6M_08oM) - State of the Onion report for the year 2019.[39m
|
||
[38;2;255;187;0m[4mWhistleblowing[0m
|
||
[38;5;12m- [39m[38;5;14m[1mGlobaLeaks[0m[38;5;12m (https://www.globaleaks.org/) - GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mSecureDrop[0m[38;5;12m (https://github.com/freedomofpress/securedrop) - SecureDrop is an open-source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mWikiLeaks[0m[38;5;12m (https://wikileaks.org/) - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying, and corruption.[39m
|
||
|
||
[38;5;12mtor Github: https://github.com/polycarbohydrate/awesome-tor[39m
|