Skip to content

Tor

Awesome

awesome-tor-logo

Awesome Tor is a curated list of resources, tools, and applications related to the Tor network.

[!NOTE] This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

Before you read, if you want to host a Snowflake bridge in your browser to help users in censored regions bypass censorship, click here. Thank you.

Official Manual

Applications

Tails

A portable, Debian-based OS that runs from the RAM, leaving no trace. Uses Tor Browser as the primary browser. - Contribute - Documentation - Download - Homepage - How it works - News - Support

Tor / Tor Browser

Open-source web browser that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer, overlay network to conceal location and usage from anyone conducting network surveillance or traffic analysis. - About - Commmunity - Donate - Download - Support - News - Core Tor / Little-t-tor - Installation / Verify source code - Forum / Support

Other applications

  • ansible-relayor - This is an ansible role for tor relay operators.
  • bine - Go library for accessing and embedding Tor clients and servers.
  • Briar - Peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi, or Tor.
  • Bulk Tor Exit Exporter - Identify Tor exit nodes by showing exit node IPv4 and fingerprint information.
  • Chutney - Configures a Tor network, launches and monitors it, and then runs tests on it.
  • dnscrypt-proxy - A flexible DNS proxy, with support for encrypted DNS protocols.
  • dos-over-tor - Proof of concept denial of service over Tor stress test tool.
  • DocTor - A notification service that monitors newly published descriptor information for issues.
  • eotk - Tool for deploying HTTP/Onion sites to provide official, onion-networking for popular websites.
  • exitmap - Scanner for Tor to detect bad exits (spoiled onions).
  • haskell-tor - A Haskell implementation of the Tor protocol.
  • HTTPS Everywhere - Only allows the browser to connect using HTTPS, built-in Tor.
  • kalitorify - Shell script to create a transparent proxy through Tor for Kali Linux OS.
  • Tor Metrics - Adjustable graphs to visualize the statistics of Tor.
  • multitor - Create multiple Tor instances with load balancing.
  • mini-tor - Smallest application size while accessing internet content and hidden service content.
  • node-Tor - JavaScript open-source implementation of the Tor protocol on the server side and browsers.
  • nyx - CLI interface which includes detailed real-time information about your relay.
  • offensive-tor-toolkit - Bind/Reverse Shells, SOCKS, etc over Tor in Go.
  • onion-grater - Whitelisting filter for dangerous Tor control protocol commands.
  • Onionbalance - A way to load balance onion services across multiple backend Tor instances.
  • Onionoo - A web-based protocol to learn about currently running Tor relays and bridges.
  • OnionScan - Help operators of hidden services find and fix operational security issues with their services.
  • OnionShare - Anonymously share files, host website, and chat using the Tor network.
  • OONI - Test the blocking of websites and apps. Measure the speed and performance of your network.
  • Orbot - Tor on Android.
  • Orfox - Modified Tor browser for Android. Requires Orbot.
  • php-torcontrol - TorControl is a PHP library to control a Tor server.
  • Relay Search - Easy way to search for information about relays.
  • Ricochet Refresh - Ricochet Refresh is a peer-to-peer messenger app that uses Tor to connect clients.
  • rotating-proxy - Rotating Tor proxy with Docker.
  • sbws - A Tor bandwidth scanner that generates bandwidth files to be used by Directory Authorities.
  • Stormy - Stormy is a wizard that helps people create Tor Onion Services with just a few clicks.
  • setup-tor - Set up your GitHub Actions workflow with a specific version of Tor.
  • Stem - Stem is a Python controller library for Tor.
  • Shadow - Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in.
  • Tallow - A program that redirects all outbound traffic from a Windows machine via the Tor anonymity network.
  • tor_box - An all-inclusive Tor configuration for Raspberry Pi, that serves as a relay and personal Tor network.
  • Tor_Onion_Proxy - Provides a .JAR and an .AAR file for embedding Tor into a Java or Android Program.
  • tor_ssh.sh - Command that allows SSH access using Tor to any server.
  • tor-browser-selenium - A Python library to automate Tor Browser with Selenium WebDriver.
  • tor-controller - Run Tor Onion Services on Kubernetes.
  • tor-hidden-service - Docker container made for Onion Services in v2 or v3.
  • tor-relay-bootstrap - Script to bootstrap a Debian server to be a set-and-forget Tor relay.
  • Tor.framework - Tor.framework is the easiest way to embed Tor in your iOS application.
  • tor.rb - This is a Ruby library for interacting with the Tor anonymity network.
  • Tor2web - HTTP proxy software that enables access to Tor Hidden Services through common web browsers.
  • TorBot - Onion site crawler for data collection.
  • TorChat-Mac - macOS native TorChat client.
  • TorChat - Decentralized anonymous instant messenger on top of Tor Hidden Services.
  • TorCheck - Determines if a visitor is using Tor or not.
  • torDDoS - TorDDos is a Python tool to automatize DDoS attacks on a website from the Tor network.
  • toriptabkes2 - An anonymizer that sets up iptables and Tor to route all traffic through the Tor network.
  • torps - The Tor Path Simulator (TorPS) is a tool for efficiently simulating path selection in Tor.
  • Torsocks - Allows you to use most applications safely with Tor.
  • Tortilla - Tool that securely, anonymously, and transparently routes all TCP/IP and DNS traffic through Tor.
  • tun2tor - Rust library that creates a utun (userspace tunnel) interface, and connects it to a stream-based proxy.
  • txtorcon - An implementation of the control-spec for Tor using the Twisted networking library for Python.
  • Vanguards - This addon protects against guard discovery and related traffic analysis attacks.
  • Whonix - OS designed for advanced security and privacy using the desktop-wide use of the Tor network.
  • ZeroNet - Free and uncensorable websites, using Bitcoin cryptography, the BitTorrent network, and Tor support.

Bridges

  • BridgeDB - BridgeDB is a collection of backend servers used to distribute Tor Bridges.
  • Conjure - Conjure is an anti-censorship tool in the refraction networking (a.k.a. decoy routing) lineage of circumvention systems.
  • Flash Proxies - Outdated and deprecated bridge type. It is a miniature proxy that runs in a web browser.
  • fteproxy - Outdated and deprecated bridge type. Tor traffic resembles plain HTTP. The name stands for "Format-Transforming Encryption."
  • meek - These pluggable transports make it look like you are browsing a major website instead of using Tor.
  • obsf2 - Outdated and deprecated bridge type. Predecessor of obsf3.
  • obsf3 - Outdated and deprecated bridge type. Predecessor of obsf4.
  • obsf4 - A pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.
  • ScrambleSuit - Outdated and deprecated bridge type. A pluggable transport protocol for obfsproxy. It is written in pure Python.
  • Snowflake - Making your internet activity appear as though you're using the internet for a regular video or voice call.
  • Webtunnel - WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT.

Bypass Censorship

  • Firefly - A proxy software to help circumvent the Great Firewall.
  • FWlite - An anti-censorship HTTP proxy with built-in shadowsocks support.
  • Google Fi Wireless - Great phone solution that allows calls, text messaging, and use of cellular data that bypasses China's Great Firewall.
  • Lantern - Censorship circumvention tool available for free download on any operating system.
  • MTProxy - Allows users in censored areas to connect to Telegram.
  • NaïveProxy - NaïveProxy uses Chromium's network stack to camouflage traffic with strong censorship resistance and low detectability.
  • nodeunblocker - Host your copy of nodeunblocker.com using Node.js to bypass censorship on the internet.
  • PrivadoVPN - VPN that is based in Switzerland and follows Swiss privacy laws. Bypasses even in China.
  • ProtonVPN - VPN that allows for circumvention of censorship even in China. Free plan bypasses along with multiple servers and protocols. No logs policy.
  • Private Bridges - Go to I need an alternative way of getting bridges! section. Follow the instructions.
  • Runet Censorship Bypass - A browser extension for Chromium and Firefox that helps to bypass censorship in Russia.
  • StegoTorus - A Camouflage Proxy for the Tor Anonymity System.
  • trojan - An unidentifiable mechanism that helps you bypass GFW.

Public reception, Impact, News, and Legislation

State of the Onion

  • 2024 - Ongoing - State of the Onion report for the year 2024.
  • 2023 - State of the Onion report for the year 2023.
  • 2022 - State of the Onion report for the year 2022.
  • 2021 - State of the Onion report for the year 2021.
  • 2020 - State of the Onion report for the year 2020.
  • 2019 - State of the Onion report for the year 2019.

Whistleblowing

  • GlobaLeaks - GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform.
  • SecureDrop - SecureDrop is an open-source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.
  • WikiLeaks - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying, and corruption.