Displaying 1 to 15 from 15 results

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

OnionBrowser - An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network

  •    Objective-C

This is the Onion Browser 2.X branch, based on Endless. The old version of Onion Browser can be found here. Onion Browser is a free web browser for iPhone and iPad that encrypts and tunnels web traffic through the Tor network. See the official site for more details and App Store links.

SecureDrop - Whistleblower Submission System

  •    Python

SecureDrop is an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation. Among the tools used in and around the SecureDrop application are: Tor, GnuPG encryption, Apache, OSSEC, grsecurity, Ubuntu, the Tails operating system, and an air-gap.

exitmap - A fast and modular scanner for Tor exit relays.

  •    Python

Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays: Modules can perform any TCP-based networking task like fetching a web page, uploading a file, connecting to an SSH server, or joining an IRC channel.In practice, exitmap is useful to monitor the reliability and trustworthiness of exit relays. The Tor Project uses exitmap to check for false negatives on the Tor Project's check service and to find malicious exit relays. It is easy to develop new modules for exitmap; just have a look at the file HACKING in the doc/ directory or check out one of the existing modules.




multitor - A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy

  •    Shell

A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy. It's provides one single endpoint for clients. Support socks protocol and http-proxy servers: polipo, privoxy and hpts. In addition, you can view previously running TOR processes and create a new identity for all or selected processes. Multitor was created with the aim of initialize many TOR processes as quickly as possible. I could use many instances for my daily use programs (web browsers, messangers and other). In addition, I was looking for a tool that would increase anonymity when conducting penetration tests and testing the security of infrastructure.

scramblesuit - The ScrambleSuit traffic obfuscation protocol.

  •    Python

Besides, ScrambleSuit's payload is computationally indistinguishable from randomness. Clients can authenticate themselves towards a ScrambleSuit bridge by conducting a modified UniformDH handshake or by redeeming a session ticket.For a more detailed overview of ScrambleSuit, please have a look at the project page available at http://veri.nymity.ch/scramblesuit/. The research paper is available at http://veri.nymity.ch/pdf/wpes2013.pdf. Finally, the directory "doc/" in this repository contains ScrambleSuit's protocol specification.

sybilhunter - Hunting for Sybils and anomalies in archived Tor network data.

  •    Go

Sybilhunter is a command line tool written in Go to discover and analyse Sybil relays in the Tor network. It does so by implementing a number of analysis techniques that take as input archived Tor network data. For example, sybilhunter can tell you (i) when an unusally large amount of relays joined or left the Tor network, (ii) which Tor relays changed their identity keys a lot, and (iii) which Tor relays are configured very similar to each other. Ideally, sybilhunter should become a Swiss Army knife for analysing anomalies in network consensuses and relay descriptors. The theory behind sybilhunter is discussed in a research paper that was published at the USENIX Security 2016 conference.Now you have one month worth of consensuses and can proceed to the next section to learn more about analysis examples.


zoossh - Parsing library for Tor-specific data formats.

  •    Go

Zoossh is a Go parsing library for Tor-specific data formats. It can parse consensuses and server descriptors. I originally wrote zoossh as a speedy fundament for sybilhunter, a tool to find Sybils in the Tor network. I have no need for other file types, so if zoossh doesn't provide what you need, check out the libraries below.For more information about file formats, have a look at CollecTor.

onionite - Explore the Tor network

  •    Javascript

PWA to view information on the individual nodes that make up the Tor network.Onionite is heavily inspired by Atlas and Globe.

docker-tor-simple - Simplest minimal container for Tor anonymity software

  •    Makefile

Smallest minimal docker container for Tor network proxy daemon. Suitable for relay, exit node or hidden service modes with SOCKS5 proxy enabled. It works well as a single self-contained container or in cooperation with other containers (like nginx and osminogin/php-fpm) for organizing complex hidden services on the Tor network.

private-tor-network - Run an isolated instance of a tor network in Docker containers

  •    Shell

tor research: learn how tor interacts with nodes, make modifications to settings and see what happens, understand how the Tor Network operates without affecting real people. Originally this project was part of a class I wrote to teach about how tor works. tor development: in the case you're working on a patch that is more complex and requires seeing what happens on the tor network, you can apply the patches to the containers.

Online-Privacy-Test-Resource-List - Privacy Online Test And Resource Compendium (POTARC) 🕵🏻

  •    

Privacy Online Test And Resource Compendium© (short: POTARC) project original created under the MIT license 2016 - 2018 by CHEF-KOCH and community. The list is designed to show all available and useful online/offline tests in order to build strategies to harden your OS/Internet/Browser configuration against fingerprinting methods. Some of those services might collect only data to hand/sell it to 3th-party developer or people which pay for it to use it for 'bad' things, such services are (if known) marked and aren't preferable added - so keep this in mind before you request a site.

onionoo-node-client - Node.js client library for the Tor Onionoo API

  •    Javascript

Promise based client library for the Tor Onionoo API. Includes DB agnostic caching. By default no cache is used. You can easily cache in memory or to a more scalable store like Redis using Keyv storage adapters.

tortipi - Tor based Raspberry π hotspot

  •    Shell

TorTiPi is a tool to setup the Tor based wifi hotspot on Raspberry Pi Model 3. This tool can also work with the other models on Raspberry but would require exteranl wifi adapter plugged into RP, which would be helpful to create access point. At this point TTP provides extremly simple but complete setup to create Tor network access point. I will not mention that why should one use Tor if you are curious to know this blog post is a good read. If you really want to get your hands dirty with anonymity, then lets gets started. Only 4 simple commands. 😄 At the end of the installation, a Access point named as TorTiPi will be up and its default password would be changeme. If you want to change deafult password, TorTiPi simplifies that too for you.





We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.