TorSharp - Use Tor for your C# HTTP clients. Tor + Privoxy = :heart:

  •        516

All you need is client code that can use a simple HTTP proxy.

https://github.com/joelverhagen/TorSharp

Tags
Implementation
License
Platform

   




Related Projects

multitor - A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy

  •    Shell

A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy. It's provides one single endpoint for clients. Support socks protocol and http-proxy servers: polipo, privoxy and hpts. In addition, you can view previously running TOR processes and create a new identity for all or selected processes. Multitor was created with the aim of initialize many TOR processes as quickly as possible. I could use many instances for my daily use programs (web browsers, messangers and other). In addition, I was looking for a tool that would increase anonymity when conducting penetration tests and testing the security of infrastructure.

docker-onion-nmap - Scan

  •    Shell

Use nmap to scan hidden "onion" services on the Tor network. Minimal image based on alpine, using proxychains to wrap nmap. Tor and dnsmasq are run as daemons via s6, and proxychains wraps nmap to use the Tor SOCKS proxy on port 9050. Tor is also configured via DNSPort to anonymously resolve DNS requests to port 9053. dnsmasq is configured to with this localhost:9053 as an authority DNS server. Proxychains is configured to proxy DNS through the local resolver, so all DNS requests will go through Tor and applications can resolve .onion addresses. When the container boots, it launches Tor and dnsmasq as daemons. The tor_wait script then waits for the Tor SOCKS proxy to be up before executing your command.

exitmap - A fast and modular scanner for Tor exit relays.

  •    Python

Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays: Modules can perform any TCP-based networking task like fetching a web page, uploading a file, connecting to an SSH server, or joining an IRC channel.In practice, exitmap is useful to monitor the reliability and trustworthiness of exit relays. The Tor Project uses exitmap to check for false negatives on the Tor Project's check service and to find malicious exit relays. It is easy to develop new modules for exitmap; just have a look at the file HACKING in the doc/ directory or check out one of the existing modules.

deeponion - Official Source Repo for DeepOnion - Anonymous Cryptocurrency on TOR Network

  •    C

DeepOnion (ONION) is an anonymous cryptocurrency that is untraceable. All transactions are private and sent through the TOR network. The integration with TOR ensures that our users are always on a secure environment. There is no client-side configuration needed. Our client will automatically join the TOR network and connect to the available TOR nodes on the network (including our seed nodes). After a successful connection to the DeepOnion network, you may check your displayed IP using DeepOnion client console, where you will see that your client is assigned a hidden TOR address (.onion address).

haskell-tor - A Haskell implementation of the Tor protocol.

  •    Haskell

Tor is a secure onion routing network for providing anonymized access to both the public Internet as well as a series of Tor-internal hidden services. Much more information about Tor can be found at https://www.torproject.org. Many thanks to all the hard work that project has put into developing and evangelizing Tor.


onionshare - Securely and anonymously share a file of any size

  •    Python

OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor Onion Service, and generating an unguessable URL to access and download the files. It does not require setting up a separate server or using a third party file-sharing service. You host the files on your own computer and use a Tor Onion Service to make it temporarily accessible over the internet. The receiving user just needs to open the URL in Tor Browser to download the file. To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki.

Whonix

  •    Shell

Whonix is an anonymous operating system.

tor-controller - Run Tor onion services on Kubernetes

  •    Go

tor-controller allows you to create OnionService resources in kubernetes. These services are used similarly to standard kubernetes services, but they only serve traffic on the tor network (available on .onion addresses). See this page for more information about onion services.

Orchid - Tor client implementation and library written in pure Java

  •    Java

Orchid is a Tor client implementation and library written in pure Java. Orchid will open a SOCKS5 listener which can be used as a standalone client where Tor would otherwise be used. It can also be used as a library by any application running on the JVM.

SilverTunnel-NG - Java library for easy accessing Tor network.

  •    Java

SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version.

rotating-proxy - Rotating TOR proxy with Docker

  •    Ruby

Why: Lots of IP addresses. One single endpoint for your client. Load-balancing by HAproxy.Please note: Tor offers a SOCKS Proxy only. In order to allow communication from HAproxy to Tor, Polipo is used to translate from HTTP proxy to SOCKS proxy. HAproxy is able to talk to HTTP proxies only.

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

Shallot - Shallot allows you to create customized

  •    C

If you place the RSA private key (including its header and footer) in a file called private_key in the HiddenServiceDir you specified in your torrc, (If you don’t know what that means, read the Tor man page. If you still don’t understand, Shallot probably isn’t for you.) then when you restart your Tor, a hostname file will be created in HiddenServiceDir that contains your shiny new .onion address. It is sometimes claimed that private keys generated by Shallot are less secure than those generated by Tor. This is false. Although Shallot generates a keypair with an unusually large public exponent e, it performs all of the sanity checks specified by PKCS #1 v2.1 (directly in sane_key), and then performs all of the sanity checks that Tor does when it generates an RSA keypair (by calling the OpenSSL function RSA_check_key).

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

mini-tor - proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI

  •    C++

mini-tor is a proof-of-concept utility for accessing internet content and hidden service content (.onion) via tor routers. this utility is aiming for as smallest size as possible (currently ~47kb, compressed with kkrunchy ~20kb), which is achieved by using Microsoft CryptoAPI/CNG instead of embedding OpenSSL. you can disable logging by commenting out #define MINI_LOG_ENABLED in mini/logger.h. this will also result in fairly reduced size of the executable.

Chat.onion - Anonymous and fully encrypted peer-to-peer instant messenger for Android using onion routing (via Tor)

  •    Java

Chat.onion is an anonymous and fully encrypted peer-to-peer instant messenger for Android using onion routing (via Tor). Many instant messengers already use encryption to secure message contents, but they can't hide important metadata such as your IP address and who you are communicating with. To hide all your information, including your metadata, identity, and IP address, Chat.onion uses onion routing (Tor) to send each message over several randomly selected proxy servers. Multiple layers of encryption are used to ensure that each proxy only knows it's immediate successor and predecessor, but not the entire message route.

NetCipher - Network Security and Proxy Library for Android

  •    Java

NetCipher is a library for Android that provides multiple means to improve network security in mobile applications. It provides best practices TLS settings using the standard Android HTTP methods, HttpURLConnection and Apache HTTP Client, provides simple Tor integration, makes it easy to configure proxies for HTTP connections and WebView instances. IT MUST BE NOTED, that you can use this library without using Orbot/Tor, but obviously we think using strong TLS/SSL connections over Tor is just about the best thing in the world.

BlackBelt Privacy Tor+WASTE darkNet()

  •    

Tor helps keep you safe online. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous() Privacy Pack. An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE).

portal - Personal Onion Router To Assure Liberty

  •    

PORTAL is a project that aims to keep people out of jail. It is a dedicated hardware device (a router) which forces all internet traffic to be sent over the Tor network. This significantly increases the odds of using Tor effectively, and reduces the potential to make fatal mistakes. There are two ways to construct a PORTAL: using a chipped router (recommended), or using "the /overlay trick". Using a modified router (with sufficient onboard flash) provides the most flexibility for internet connectivity (either WiFi or 3G) as well as ensuring that the Tor process has sufficient RAM to run. A chipped router provides the best overall experience. The /overlay trick enables a stock router to union mount a microSD card for additional storage space. This allows for multiple microSD cards to provide different configurations (also possible with a chipped router), but has the downside of requiring a 3G modem with onboard microSD slot.





We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.