Awesome Tor is a curated list of resources, tools, and applications related to the Tor network.
This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.
Before you read, if you want to host a Snowflake bridge in your browser to help users in censored regions bypass censorship, click here. Thank you.
- Official Manual
- Applications
- Bridges
- Bypass Censorship
- Public reception, Impact, News, and Legislation
- Whistleblowing
- About Tor Browser - Learn what Tor Browser can do to protect your privacy and anonymity.
- Anti-fingerprinting - How Tor Browser mitigates browser fingerprinting.
- Bridges - Most Pluggable Transports, such as obfs4, rely on the use of "bridge" relays.
- Circumvention - What to do if the Tor network is blocked.
- Downloading - How to download Tor Browser.
- Installation - Installing Tor Browser.
- Known Issues - Issues with Tor.
- Make Tor Browser Portable - How to install Tor Browser onto removable media.
- Managing Identities - Learn how to control personally identifying information in Tor Browser.
- Mobile Tor - Learn about Tor for mobile devices.
- Onion Services - Services that are only accessible using Tor.
- Plugins, add-ons, and JavaScript - How Tor Browser handles add-ons, plugins, and JavaScript.
- Running Tor Browser - Learn how to use Tor Browser for the first time.
- Secure Connections - Learn how to protect your data using Tor Browser and HTTPS.
- Security Settings - Configuring Tor Browser for security and usability.
- Support - How to get help, report a bug, or give feedback.
- Troubleshooting - What to do if Tor Browser doesn't work properly.
- Updating - How to update Tor Browser.
- Uninstalling - How to remove Tor Browser from your system.
A portable, Debian-based OS that runs from the RAM, leaving no trace. Uses Tor Browser as the primary browser.
Open-source web browser that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer, overlay network to conceal location and usage from anyone conducting network surveillance or traffic analysis.
- ansible-relayor - This is an ansible role for tor relay operators.
- bine - Go library for accessing and embedding Tor clients and servers.
- Briar - Peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi, or Tor.
- Bulk Tor Exit Exporter - Identify Tor exit nodes by showing exit node IPv4 and fingerprint information.
- Chutney - Configures a Tor network, launches and monitors it, and then runs tests on it.
- dnscrypt-proxy - A flexible DNS proxy, with support for encrypted DNS protocols.
- dos-over-tor - Proof of concept denial of service over Tor stress test tool.
- DocTor - A notification service that monitors newly published descriptor information for issues.
- eotk - Tool for deploying HTTP/Onion sites to provide official, onion-networking for popular websites.
- exitmap - Scanner for Tor to detect bad exits (spoiled onions).
- haskell-tor - A Haskell implementation of the Tor protocol.
- HTTPS Everywhere - Only allows the browser to connect using HTTPS, built-in Tor.
- kalitorify - Shell script to create a transparent proxy through Tor for Kali Linux OS.
- Tor Metrics - Adjustable graphs to visualize the statistics of Tor.
- multitor - Create multiple Tor instances with load balancing.
- mini-tor - Smallest application size while accessing internet content and hidden service content.
- node-Tor - JavaScript open-source implementation of the Tor protocol on the server side and browsers.
- nyx - CLI interface which includes detailed real-time information about your relay.
- offensive-tor-toolkit - Bind/Reverse Shells, SOCKS, etc over Tor in Go.
- onion-grater - Whitelisting filter for dangerous Tor control protocol commands.
- Onionbalance - A way to load balance onion services across multiple backend Tor instances.
- Onionoo - A web-based protocol to learn about currently running Tor relays and bridges.
- OnionScan - Help operators of hidden services find and fix operational security issues with their services.
- OnionShare - Anonymously share files, host website, and chat using the Tor network.
- OONI - Test the blocking of websites and apps. Measure the speed and performance of your network.
- Orbot - Tor on Android.
- Orfox - Modified Tor browser for Android. Requires Orbot.
- php-torcontrol - TorControl is a PHP library to control a Tor server.
- Relay Search - Easy way to search for information about relays.
- Ricochet Refresh - Ricochet Refresh is a peer-to-peer messenger app that uses Tor to connect clients.
- rotating-proxy - Rotating Tor proxy with Docker.
- sbws - A Tor bandwidth scanner that generates bandwidth files to be used by Directory Authorities.
- Stormy - Stormy is a wizard that helps people create Tor Onion Services with just a few clicks.
- setup-tor - Set up your GitHub Actions workflow with a specific version of Tor.
- Stem - Stem is a Python controller library for Tor.
- Shadow - Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in.
- Tallow - A program that redirects all outbound traffic from a Windows machine via the Tor anonymity network.
- tor_box - An all-inclusive Tor configuration for Raspberry Pi, that serves as a relay and personal Tor network.
- Tor_Onion_Proxy - Provides a .JAR and an .AAR file for embedding Tor into a Java or Android Program.
- tor_ssh.sh - Command that allows SSH access using Tor to any server.
- tor-browser-selenium - A Python library to automate Tor Browser with Selenium WebDriver.
- tor-controller - Run Tor Onion Services on Kubernetes.
- tor-hidden-service - Docker container made for Onion Services in v2 or v3.
- tor-relay-bootstrap - Script to bootstrap a Debian server to be a set-and-forget Tor relay.
- Tor.framework - Tor.framework is the easiest way to embed Tor in your iOS application.
- tor.rb - This is a Ruby library for interacting with the Tor anonymity network.
- Tor2web - HTTP proxy software that enables access to Tor Hidden Services through common web browsers.
- TorBot - Onion site crawler for data collection.
- TorChat-Mac - macOS native TorChat client.
- TorChat - Decentralized anonymous instant messenger on top of Tor Hidden Services.
- TorCheck - Determines if a visitor is using Tor or not.
- torDDoS - TorDDos is a Python tool to automatize DDoS attacks on a website from the Tor network.
- toriptabkes2 - An anonymizer that sets up iptables and Tor to route all traffic through the Tor network.
- torps - The Tor Path Simulator (TorPS) is a tool for efficiently simulating path selection in Tor.
- Torsocks - Allows you to use most applications safely with Tor.
- Tortilla - Tool that securely, anonymously, and transparently routes all TCP/IP and DNS traffic through Tor.
- tun2tor - Rust library that creates a utun (userspace tunnel) interface, and connects it to a stream-based proxy.
- txtorcon - An implementation of the control-spec for Tor using the Twisted networking library for Python.
- Vanguards - This addon protects against guard discovery and related traffic analysis attacks.
- Whonix - OS designed for advanced security and privacy using the desktop-wide use of the Tor network.
- ZeroNet - Free and uncensorable websites, using Bitcoin cryptography, the BitTorrent network, and Tor support.
- BridgeDB - BridgeDB is a collection of backend servers used to distribute Tor Bridges.
- Conjure - Conjure is an anti-censorship tool in the refraction networking (a.k.a. decoy routing) lineage of circumvention systems.
- Flash Proxies - Outdated and deprecated bridge type. It is a miniature proxy that runs in a web browser.
- fteproxy - Outdated and deprecated bridge type. Tor traffic resembles plain HTTP. The name stands for "Format-Transforming Encryption."
- meek - These pluggable transports make it look like you are browsing a major website instead of using Tor.
- obsf2 - Outdated and deprecated bridge type. Predecessor of obsf3.
- obsf3 - Outdated and deprecated bridge type. Predecessor of obsf4.
- obsf4 - A pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.
- ScrambleSuit - Outdated and deprecated bridge type. A pluggable transport protocol for obfsproxy. It is written in pure Python.
- Snowflake - Making your internet activity appear as though you're using the internet for a regular video or voice call.
- Webtunnel - WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT.
- Firefly - A proxy software to help circumvent the Great Firewall.
- FWlite - An anti-censorship HTTP proxy with built-in shadowsocks support.
- Google Fi Wireless - Great phone solution that allows calls, text messaging, and use of cellular data that bypasses China's Great Firewall.
- Lantern - Censorship circumvention tool available for free download on any operating system.
- MTProxy - Allows users in censored areas to connect to Telegram.
- NaïveProxy - NaïveProxy uses Chromium's network stack to camouflage traffic with strong censorship resistance and low detectability.
- nodeunblocker - Host your copy of nodeunblocker.com using Node.js to bypass censorship on the internet.
- PrivadoVPN - VPN that is based in Switzerland and follows Swiss privacy laws. Bypasses even in China.
- ProtonVPN - VPN that allows for circumvention of censorship even in China. Free plan bypasses along with multiple servers and protocols. No logs policy.
- Private Bridges - Go to
I need an alternative way of getting bridges!
section. Follow the instructions. - Runet Censorship Bypass - A browser extension for Chromium and Firefox that helps to bypass censorship in Russia.
- StegoTorus - A Camouflage Proxy for the Tor Anonymity System.
- trojan - An unidentifiable mechanism that helps you bypass GFW.
- A close look at the Great Firewall of China - Some information about the censorship of Tor within China.
- Analyzing China's Blocking of Unpublished Tor Bridges - Study on how China blocks unlisted Tor bridges and how to prevent this.
- Anarcho-Tech NYC Wiki - Wiki that explains how to stay private and anonymous online.
- Anonymity Bibliography - Selected papers in anonymity from 1977 - 2020.
- Dropping Docs on Darknet - DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught.
- How governments have tried to block Tor - How governments have tried to block Tor by 28c3.
- How the Great Firewall of China is blocked in China - Paper explaining how Tor is banned in China along with ways to circumvent it.
- Learning more about the GFW's active probing system - Page about the GFW's censorship system and how it works.
- My Experience With the Great Firewall of China - Blog on CFW of China by an InfoSec professional during one of their visits.
- Protocol Misidentification Made Easy with Format-Transforming Encryption - How FTE worked.
- Russia Passes Bill Banning Tor - Article about Russia banning VPNs and Tor.
- Scaling Tor hidden services - How to scale hidden services.
- ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship - How ScrambleSuit worked.
- Snowden Revelations - The Snowden Revelations explained.
- State of the Onion - 2023 - Tor Project's annual virtual event where we share updates from teams and the community, highlighting their work and the impact it has made across the globe during the year.
- StegoTorus: A Camouflage Proxy for the Tor Anonymity System - A paper on how StegoTorus works.
- Technical and Legal Overview of Tor - Overview of Tor is presented from the technical perspective and also several legal issues related to its use are analyzed.
- Tor after the Snowden revelations - About the Snowden revelations and what Tor will do in 2024.
- Tor Browser Afforded CDA Immunity for Dark Web Transactions - Court document about the death of a minor through purchasing narcotics on Tor.
- Tor Hidden Services and Deanonyminization - Talk about how Tor and its services can be exploited to expose a user's information as well as how to prevent attacks.
- Tor Overview - Overview of Tor by Privacyguides.
- Understanding The Onion Router in 2024 - Explains what Tor is; update for 2024.
- What is Tor? - Gives a very good explanation for Tor, Onion Services, and how it promotes human rights.
- GlobaLeaks - GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform.
- SecureDrop - SecureDrop is an open-source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.
- WikiLeaks - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying, and corruption.