nipe - Nipe is a script to make Tor Network your default gateway.

  •        12

Nipe is a script to make Tor Network your default gateway.

https://heitorgouvea.me/nipe
https://github.com/GouveaHeitor/nipe

Tags
Implementation
License
Platform

   




Related Projects

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

Tails - Live operating system which preserves privacy and anonymity

  •    C

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. Tails relies on the Tor anonymity network to protect your privacy online. It encrypt and sign your emails and documents using the de facto standard OpenPGP either from Tails email client, text editor or file browser.

SilverTunnel-NG - Java library for easy accessing Tor network.

  •    Java

SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version.

multitor - A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy

  •    Shell

A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy. It's provides one single endpoint for clients. Support socks protocol and http-proxy servers: polipo, privoxy and hpts. In addition, you can view previously running TOR processes and create a new identity for all or selected processes. Multitor was created with the aim of initialize many TOR processes as quickly as possible. I could use many instances for my daily use programs (web browsers, messangers and other). In addition, I was looking for a tool that would increase anonymity when conducting penetration tests and testing the security of infrastructure.


Tails - Live Operating System supports Privacy and Anonymity

  •    C

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to use the Internet anonymously and circumvent censorship. All connections to the Internet are forced to go through the Tor network. It leaves no trace on the computer you are using unless you ask it explicitly. It uses cryptographic tools to encrypt your files, emails and instant messaging.

Whonix

  •    Shell

Whonix is an anonymous operating system.

deeponion - Official Source Repo for DeepOnion - Anonymous Cryptocurrency on TOR Network

  •    C

DeepOnion (ONION) is an anonymous cryptocurrency that is untraceable. All transactions are private and sent through the TOR network. The integration with TOR ensures that our users are always on a secure environment. There is no client-side configuration needed. Our client will automatically join the TOR network and connect to the available TOR nodes on the network (including our seed nodes). After a successful connection to the DeepOnion network, you may check your displayed IP using DeepOnion client console, where you will see that your client is assigned a hidden TOR address (.onion address).

coyim - coyim - a safe and secure chat client

  •    Go

CoyIM is a new client for the XMPP protocol. It is built upon https://github.com/agl/xmpp-client and https://github.com/coyim/otr3. It adds a graphical user interface and implies safe and secure options by default. Our ambition is that it should be possible for even the most high-risk people on the planet to safely use CoyIM, without having to make any configuration changes. To do this, CoyIM has OTR enabled and uses Tor by default. Besides that, it will only use the Tor Onion Service for a known server and also uses TLS and TLS certificates to verify the connection - no configuration required. The implementation is written in the Go language, to avoid many common types of vulnerabilities that come from using unsafe languages.

iOS-OnionBrowser

  •    Objective-C

An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

Ricochet - Anonymous peer-to-peer instant messaging

  •    C++

Ricochet is an experimental kind of instant messaging that doesn't trust anyone with your identity, your contact list, or your communications. Ricochet is a peer-to-peer instant messaging system built on the Tor Network hidden services. Your login is your hidden service address, and contacts connect to you (not an intermediate server) through Tor. The rendezvous system makes it extremely hard for anyone to learn your identity from your address.

TorK - Anonymity Manager for KDE

  •    C++

TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.

docker-onion-nmap - Scan

  •    Shell

Use nmap to scan hidden "onion" services on the Tor network. Minimal image based on alpine, using proxychains to wrap nmap. Tor and dnsmasq are run as daemons via s6, and proxychains wraps nmap to use the Tor SOCKS proxy on port 9050. Tor is also configured via DNSPort to anonymously resolve DNS requests to port 9053. dnsmasq is configured to with this localhost:9053 as an authority DNS server. Proxychains is configured to proxy DNS through the local resolver, so all DNS requests will go through Tor and applications can resolve .onion addresses. When the container boots, it launches Tor and dnsmasq as daemons. The tor_wait script then waits for the Tor SOCKS proxy to be up before executing your command.

PORTALofPi - PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!

  •    Shell

This will guide you through configuring an Arch based RaspberryPi installation which transparently forwards all TCP traffic over the Tor network. There is also a Tor SOCKS proxy for explicitly interacting with the Tor network, either for more security, or to access a Hidden Service. The configuration of access to the Internet is left as an exercise to the reader.

exitmap - A fast and modular scanner for Tor exit relays.

  •    Python

Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays: Modules can perform any TCP-based networking task like fetching a web page, uploading a file, connecting to an SSH server, or joining an IRC channel.In practice, exitmap is useful to monitor the reliability and trustworthiness of exit relays. The Tor Project uses exitmap to check for false negatives on the Tor Project's check service and to find malicious exit relays. It is easy to develop new modules for exitmap; just have a look at the file HACKING in the doc/ directory or check out one of the existing modules.

PcapXray - :snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction

  •    Python

Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic and Tor traffic as well as potential malicious traffic including data involved in the communication.

haskell-tor - A Haskell implementation of the Tor protocol.

  •    Haskell

Tor is a secure onion routing network for providing anonymized access to both the public Internet as well as a series of Tor-internal hidden services. Much more information about Tor can be found at https://www.torproject.org. Many thanks to all the hard work that project has put into developing and evangelizing Tor.

NetCipher - Network Security and Proxy Library for Android

  •    Java

NetCipher is a library for Android that provides multiple means to improve network security in mobile applications. It provides best practices TLS settings using the standard Android HTTP methods, HttpURLConnection and Apache HTTP Client, provides simple Tor integration, makes it easy to configure proxies for HTTP connections and WebView instances. IT MUST BE NOTED, that you can use this library without using Orbot/Tor, but obviously we think using strong TLS/SSL connections over Tor is just about the best thing in the world.

Orchid - Tor client implementation and library written in pure Java

  •    Java

Orchid is a Tor client implementation and library written in pure Java. Orchid will open a SOCKS5 listener which can be used as a standalone client where Tor would otherwise be used. It can also be used as a library by any application running on the JVM.

tor-controller - Run Tor onion services on Kubernetes

  •    Go

tor-controller allows you to create OnionService resources in kubernetes. These services are used similarly to standard kubernetes services, but they only serve traffic on the tor network (available on .onion addresses). See this page for more information about onion services.