Awesome Tor is a curated list of resources, tools, and applications related to the Tor network.
This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.
Contents
- Official Manual
-
Applications
- Bridges
- Bypass Censorship
- Public reception, Impact, News, and Legislation
-
Whistleblowing
Official Manual
-
About Tor Browser - Learn what Tor Browser can do to protect your privacy and anonymity.
-
Anti-fingerprinting - How Tor Browser mitigates browser fingerprinting.
-
Bridges - Most Pluggable Transports, such as obfs4, rely on the use of “bridge” relays.
-
Circumvention - What to do if the Tor network is blocked.
-
Downloading - How to download Tor Browser.
-
Installation - Installing Tor Browser.
-
Known Issues - Issues with Tor.
-
Make Tor Browser Portable - How to install Tor Browser onto removable media.
-
Managing Identities - Learn how to control personally identifying information in Tor Browser.
-
Mobile Tor - Learn about Tor for mobile devices.
-
Onion Services - Services that are only accessible using Tor.
-
Plugins, add-ons, and JavaScript - How Tor Browser handles add-ons, plugins, and JavaScript.
-
Running Tor Browser - Learn how to use Tor Browser for the first time.
-
Secure Connections - Learn how to protect your data using Tor Browser and HTTPS.
-
Security Settings - Configuring Tor Browser for security and usability.
-
Support - How to get help, report a bug, or give feedback.
-
Troubleshooting - What to do if Tor Browser doesn’t work properly.
-
Updating - How to update Tor Browser.
-
Uninstalling - How to remove Tor Browser from your system.
Applications
Tails
A portable, Debian-based OS that runs from the RAM, leaving no trace. Uses Tor Browser as the primary browser.
- Contribute
- Documentation
- Download
- Homepage
- How it works
- News
-
Support
Tor / Tor Browser
Open-source web browser that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer, overlay network to conceal location and usage from anyone conducting network surveillance or traffic analysis.
- About
- Commmunity
- Donate
- Download
- Support
- News
- Core Tor / Little-t-tor
-
ansible-relayor - This is an ansible role for tor relay operators.
-
bine - Go library for accessing and embedding Tor clients and servers.
-
Briar - Peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi, or Tor.
-
Bulk Tor Exit Exporter - Identify Tor exit nodes by showing exit node IPv4 and fingerprint information.
-
Chutney - Configures a Tor network, launches and monitors it, and then runs tests on it.
-
dnscrypt-proxy - A flexible DNS proxy, with support for encrypted DNS protocols.
-
dos-over-tor - Proof of concept denial of service over Tor stress test tool.
-
DocTor - A notification service that monitors newly published descriptor information for issues.
-
eotk - Tool for deploying HTTP/Onion sites to provide official, onion-networking for popular websites.
-
exitmap - Scanner for Tor to detect bad exits (spoiled onions).
-
haskell-tor - A Haskell implementation of the Tor protocol.
-
HTTPS Everywhere - Only allows the browser to connect using HTTPS, built-in Tor.
-
kalitorify - Shell script to create a transparent proxy through Tor for Kali Linux OS.
-
Tor Metrics - Adjustable graphs to visualize the statistics of Tor.
-
multitor - Create multiple Tor instances with load balancing.
-
mini-tor - Smallest application size while accessing internet content and hidden service content.
-
node-Tor - JavaScript open-source implementation of the Tor protocol on the server side and browsers.
-
nyx - CLI interface which includes detailed real-time information about your relay.
-
offensive-tor-toolkit - Bind/Reverse Shells, SOCKS, etc over Tor in Go.
-
onion-grater - Whitelisting filter for dangerous Tor control protocol commands.
-
Onionbalance - A way to load balance onion services across multiple backend Tor instances.
-
Onionoo - A web-based protocol to learn about currently running Tor relays and bridges.
-
OnionScan - Help operators of hidden services find and fix operational security issues with their services.
-
OnionShare - Anonymously share files, host website, and chat using the Tor network.
-
OONI - Test the blocking of websites and apps. Measure the speed and performance of your network.
-
Orbot - Tor on Android.
-
Orfox - Modified Tor browser for Android. Requires Orbot.
-
php-torcontrol - TorControl is a PHP library to control a Tor server.
-
Relay Search - Easy way to search for information about relays.
-
Ricochet Refresh - Ricochet Refresh is a peer-to-peer messenger app that uses Tor to connect clients.
-
rotating-proxy - Rotating Tor proxy with Docker.
-
sbws - A Tor bandwidth scanner that generates bandwidth files to be used by Directory Authorities.
-
Stormy - Stormy is a wizard that helps people create Tor Onion Services with just a few clicks.
-
setup-tor - Set up your GitHub Actions workflow with a specific version of Tor.
-
Stem - Stem is a Python controller library for Tor.
-
Shadow - Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in.
-
Tallow - A program that redirects all outbound traffic from a Windows machine via the Tor anonymity network.
-
tor_box - An all-inclusive Tor configuration for Raspberry Pi, that serves as a relay and personal Tor network.
-
Tor_Onion_Proxy - Provides a .JAR and an .AAR file for embedding Tor into a Java or Android Program.
-
tor_ssh.sh - Command that allows SSH access using Tor to any server.
-
tor-browser-selenium - A Python library to automate Tor Browser with Selenium WebDriver.
-
tor-controller - Run Tor Onion Services on Kubernetes.
-
tor-hidden-service - Docker container made for Onion Services in v2 or v3.
-
tor-relay-bootstrap - Script to bootstrap a Debian server to be a set-and-forget Tor relay.
-
Tor.framework - Tor.framework is the easiest way to embed Tor in your iOS application.
-
tor.rb - This is a Ruby library for interacting with the Tor anonymity network.
-
Tor2web - HTTP proxy software that enables access to Tor Hidden Services through common web browsers.
-
TorBot - Onion site crawler for data collection.
-
TorChat-Mac - macOS native TorChat client.
-
TorChat - Decentralized anonymous instant messenger on top of Tor Hidden Services.
-
TorCheck - Determines if a visitor is using Tor or not.
-
torDDoS - TorDDos is a Python tool to automatize DDoS attacks on a website from the Tor network.
-
toriptabkes2 - An anonymizer that sets up iptables and Tor to route all traffic through the Tor network.
-
torps - The Tor Path Simulator (TorPS) is a tool for efficiently simulating path selection in Tor.
-
Torsocks - Allows you to use most applications safely with Tor.
-
Tortilla - Tool that securely, anonymously, and transparently routes all TCP/IP and DNS traffic through Tor.
-
tun2tor - Rust library that creates a utun (userspace tunnel) interface, and connects it to a stream-based proxy.
-
txtorcon - An implementation of the control-spec for Tor using the Twisted networking library for Python.
-
Vanguards - This addon protects against guard discovery and related traffic analysis attacks.
-
Whonix - OS designed for advanced security and privacy using the desktop-wide use of the Tor network.
-
ZeroNet - Free and uncensorable websites, using Bitcoin cryptography, the BitTorrent network, and Tor support.
Bridges
-
BridgeDB - BridgeDB is a collection of backend servers used to distribute Tor Bridges.
-
Conjure - Conjure is an anti-censorship tool in the refraction networking (a.k.a. decoy routing) lineage of circumvention systems.
-
Flash Proxies - Outdated and deprecated bridge type. It is a miniature proxy that runs in a web browser.
-
fteproxy - Outdated and deprecated bridge type. Tor traffic resembles plain HTTP. The name stands for “Format-Transforming Encryption.”
-
meek - These pluggable transports make it look like you are browsing a major website instead of using Tor.
-
obsf2 - Outdated and deprecated bridge type. Predecessor of obsf3.
-
obsf3 - Outdated and deprecated bridge type. Predecessor of obsf4.
-
obsf4 - A pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.
-
ScrambleSuit - Outdated and deprecated bridge type. A pluggable transport protocol for obfsproxy. It is written in pure Python.
-
Snowflake - Making your internet activity appear as though you’re using the internet for a regular video or voice call.
-
Webtunnel - WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT.
Bypass Censorship
-
Firefly - A proxy software to help circumvent the Great Firewall.
-
FWlite - An anti-censorship HTTP proxy with built-in shadowsocks support.
-
Google Fi Wireless - Great phone solution that allows calls, text messaging, and use of cellular data that bypasses China’s Great Firewall.
-
Lantern - Censorship circumvention tool available for free download on any operating system.
-
MTProxy - Allows users in censored areas to connect to Telegram.
-
NaïveProxy - NaïveProxy uses Chromium’s network stack to camouflage traffic with strong censorship resistance and low detectability.
-
nodeunblocker - Host your copy of nodeunblocker.com using Node.js to bypass censorship on the internet.
-
PrivadoVPN - VPN that is based in Switzerland and follows Swiss privacy laws. Bypasses even in China.
-
ProtonVPN - VPN that allows for circumvention of censorship even in China. Free plan bypasses along with multiple servers and protocols. No logs policy.
-
Private Bridges - Go to
I need an alternative way of getting bridges!
section. Follow the instructions.
-
Runet Censorship Bypass - A browser extension for Chromium and Firefox that helps to bypass censorship in Russia.
-
StegoTorus - A Camouflage Proxy for the Tor Anonymity System.
-
trojan - An unidentifiable mechanism that helps you bypass GFW.
Public reception, Impact, News, and Legislation
-
A close look at the Great Firewall of China - Some information about the censorship of Tor within China.
-
Analyzing China’s Blocking of Unpublished Tor Bridges - Study on how China blocks unlisted Tor bridges and how to prevent this.
-
Anarcho-Tech NYC Wiki - Wiki that explains how to stay private and anonymous online.
-
Anonymity Bibliography - Selected papers in anonymity from 1977 - 2020.
-
Dropping Docs on Darknet - DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught.
-
How governments have tried to block Tor - How governments have tried to block Tor by 28c3.
-
How the Great Firewall of China is blocked in China - Paper explaining how Tor is banned in China along with ways to circumvent it.
-
Learning more about the GFW’s active probing system - Page about the GFW’s censorship system and how it works.
-
My Experience With the Great Firewall of China - Blog on CFW of China by an InfoSec professional during one of their visits.
-
Protocol Misidentification Made Easy with Format-Transforming Encryption - How FTE worked.
-
Russia Passes Bill Banning Tor - Article about Russia banning VPNs and Tor.
-
Scaling Tor hidden services - How to scale hidden services.
-
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - How ScrambleSuit worked.
-
Snowden Revelations - The Snowden Revelations explained.
-
State of the Onion - 2023 - Tor Project’s annual virtual event where we share updates from teams and the community, highlighting their work and the impact it has made across the globe during the year.
-
StegoTorus: A Camouflage Proxy for the Tor Anonymity System - A paper on how StegoTorus works.
-
Technical and Legal Overview of Tor - Overview of Tor is presented from the technical perspective and also several legal issues related to its use are analyzed.
-
Tor after the Snowden revelations - About the Snowden revelations and what Tor will do in 2024.
-
Tor Browser Afforded CDA Immunity for Dark Web Transactions - Court document about the death of a minor through purchasing narcotics on Tor.
-
Tor Hidden Services and Deanonyminization - Talk about how Tor and its services can be exploited to expose a user’s information as well as how to prevent attacks.
-
Tor Overview - Overview of Tor by Privacyguides.
-
Understanding The Onion Router in 2024 - Explains what Tor is; update for 2024.
-
What is Tor? - Gives a very good explanation for Tor, Onion Services, and how it promotes human rights.
Whistleblowing
-
GlobaLeaks - GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform.
-
SecureDrop - SecureDrop is an open-source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.
-
WikiLeaks - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying, and corruption.