Tor Tools

50+ Awesome Tor Tools For Browsing Dark-web Safely.

Tor is an anonymizing TCP overlay network proxy implemented as a cryptographic mixnet. It is used for protecting the privacy of user communications in a variety of operational environments.

Tor Browser

Android-based Tools

  • Orbot-Provides Tor on the Android platform.
  • Orfox-Provides Tor Browser on the Android platform.
  • Onion Proxy Library-Provides a JAR and an AAR for embedding a Onion service proxy into a Java or Android program.

Apple iOS-based Tools

  • Tor.framework-The easiest way to embed Tor in your iOS application.
  • iCepa-Apple iOS system-wide VPN-based Tor client.


Bridge Tools

  • BridgeDB-Backend bridge distributor, handling the various pools they’re distributed in.

Conferences, Presentations and Talks

  • How Tor Users Got Caught — DEFCON 22-Four [4] examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video.
  • How Governments Have Tried to Block Tor-Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January 2011 and September 2001, an oldy, but goody.
  • State of the Onion — 2014-Covers technical, social, economic, political, and cultural issues pertaining to anonymity, the Tor Project and the ecosystem surrounding our communities.
  • The Tor Network-Roger Dingledine and Jacob Appelbaum discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
  • Tor: Hidden Services and Deanonymization-This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date.

Also read : Using Python Steal Browser Data Of Anybody

Development and Research Tools

  • Chutney-Integration test suite that spawns a local Tor Network, checking the interactions of its components.
  • Compass-Web and command-line application that filters and aggregates the Tor relays based on various attributes.
  • DocTor-Notification service that monitors newly published descriptor information for issues. This is primarily a service to help the Tor Directory Authority Operators, but it also checks for a handful of other issues like sybil attacks.
  • ExitMap-Scanner for the Tor Network to detect malicious and misconfigured exits (Tor exit nodes).
  • Fingerprint Central-Website aimed at studying the diversity of browser fingerprints and providing developers with data to help them design good defenses.
  • Metrics-Processing and analytics of consensus data, provided to users via the metrics portal. This has been under active development for several years.
  • Tor Bulk Exitlist (TorBEL)-Provides a method of identifying if IPs belong to exit nodes or not. This is a replacement for TorDNSEL, which is stable (though unmaintained) Haskell application for this purpose. The initial version of TorBEL was started in GSOC 2010 but since then, the project has been inactive.

End-User Tools

  • GetTor-Email autoresponder providing Tor’s packages over SMTP. This has been relatively unchanged for quite a while.
  • Ooni Probe-Censorship scanner, checking your local connection for blocked or modified content.
  • Tor Controller (for Kubernetes)-Expose applications deployed in Kubernetes clusters via Tor Onion services.
  • Tor2web-Allows Internet users to browse websites running in Tor Hidden Services. It trades user anonymity for usability by allowing anonymous content to be distributed to non-anonymous users.
  • multitor-Shell scripts to automate creation of multiple Tor instances, load-balanced with HAProxy.

File Sharing Tools

  • OnionShare-Open-source tool that lets you securely and anonymously share a file of any size.
  • ZeroNet-Decentralized website and web application platform based on the BitTorrent protocol with Bitcoin-like blockchain that has built-in support for anonymizing through Tor.

Messaging Tools

  • Briar-Peer-to-peer encrypted messaging and forums over various transports, including Bluetooth, clearnet WiFi, or the Tor Network.
  • Ricochet-Jabber-based client that creates an Onion service used to rendezvous with your contacts without revealing your location or IP address.
  • TorChat-Mac-Mac OSX native TorChat client.
  • TorChat-Decentralized anonymous instant messenger on top of Tor Hidden Services.

Also read : Top 25 Kali Linux Penetration Testing Tools

Offensive Tools

  • ToRat-Cross-platform remote administration tool (RAT) written in Go using Tor as a transport mechanism.
  • dos-over-tor-Proof of concept denial of service (DoS) over Tor stress test tool.
  • oregano-Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.
  • Offensive Tor Toolkit-Series of tools written in Go that simplify the use of Tor for typical exploitation and post-exploitation tasks.

Onion Service Tools

  • Enterprise Onion Toolkit-Tool for assisting in large-scale deployments of HTTP(S) Onion sites as an official Onionspace presence for existing clearnet websites.
  • OnionBalance-Load-balancing and redundancy for Tor Hidden Services.
  • Stormy-Easy creation of Tor Onion Services (“Location-Hidden Services”), currently under heavy development.
  • Vanguards-Version 3 Onion service guard discovery attack mitigation script (intended for eventual inclusion in Tor core).
  • goldy/tor-hidden-service-Docker container capable of providing multiple simultaneous Onion services in either Version 2 or Version 3 format, along with added support for Vanguards.

Operating System Distributions

  • The Amnesic Incognito Live System (TAILS)-Live CD/USB distribution preconfigured so that everything is safely routed through Tor and leaves no trace on the local system.
  • Whonix-Desktop operating system that can be run in various configurations, which routes the entire user’s desktop environment and OS through Tor.
  • tor-ramdisk-uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM.

Pluggable Transports

  • Flash Proxy-Pluggable transport using proxies running in web browsers to defeat address-based blocking.
  • Obfsproxy-Obfuscating proxy that shapes Tor traffic, making it harder for censors to detect and block Tor, with implementations in C and Python.
  • ScrambleSuit-Python module for Obfsproxy suitable for either Tor, VPN, SSH, or any other application that supports SOCKS.

Relay Operator Tools

  • Anonymizing Relay Monitor (Arm)-Top-like terminal status monitor for Tor, intended for command-line aficionados, SSH connections, and anyone with a TTY terminal.
  • Weather-Provides automatic notification to subscribed relay operators when their relays are unavailable.
  • ansible-relayor-An Ansible role for Tor Relay Operators.
  • tor-relay-bootstrap-Script to bootstrap a Debian server to be a set-and-forget Tor relay.

Tor Controller Interfaces

  • Bine-Go library for accessing and embedding Tor clients and servers.
  • PHP TorControl-PHP library to control a Tor server.
  • Stem-TorProject’s official Python controller library for scripts and controller applications using Tor.
  • tor.rb-Ruby library for interacting with the Tor anonymity network.
  • txtorcon-TorProject’s official implementation of the control-spec for Tor using the Twisted networking library for Python (supports Py2, PyPy, and Py3).

Tor Server Hardening Tools

  • Tlsdate-Secure parasitic rdate replacement maintained by the Tor Project that sets the local clock by securely connecting with TLS to remote servers and extracting the remote time out of the secure handshake.
  • onion-grater-Whitelisting filter for dangerous Tor control protocol commands.

Tunneling Tools

  • dnscrypt-proxy-DNS proxy server supporting arbitrary DNS, DNSCrypt v2, DNS-over-TLS, and DNS-over-HTTPS queries that can be torified with a two-line configuration change. (force_tcp = true and proxy = socks5:// or similar).
  • command to enable SSH access via Tor to any server.
  • Torsocks-Utility for adapting other applications to work with Tor.
  • Tortilla-Open-source tool that allows users of Windows OS devices to securely, anonymously, and transparently route all TCP/IP and DNS traffic through Tor.
  • tun2tor-Rust library to provide a virtual utun (userspace tunnel) interface to Tor.

Leave a Reply