Software & Services
The Tor community of software and services aims to make your Internet experience safer and better.
The Tor Browser contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run.
Arm is a terminal status monitor for Tor, intended for command-line aficionados and ssh connections. This functions much like top does for system usage, providing real time information on Tor's resource utilization and state.
The Tor Cloud project gives you a user-friendly way of deploying bridges to help users access an uncensored Internet via the Amazon EC2 cloud. By setting up a bridge, you donate bandwidth to the Tor network and help improve the safety and speed at which users can access the Internet. Get started with Tor Cloud.
Analytics for the Tor network, including graphs of its available bandwidth and estimated userbase. This is a great resource for researchers interested in detailed statistics about Tor.
Obfsproxy is a pluggable transports proxy. It shapes Tor traffic, making it harder for censors to detect and block the Tor protocol.
Web-based protocol to learn about currently running Tor relays and bridges.
Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in. Shadow is open-source software that enables accurate, efficient, controlled, and repeatable Tor experimentation.
Python library for applications and scripts that interact with Tor.
The Amnesic Incognito Live System is a live CD/USB distribution preconfigured so that everything is safely routed through Tor and leaves no trace on the local system.
TorBirdy is Torbutton for Thunderbird and related *bird forks.
Python and Twisted event-based implementation of the Tor control protocol. Unit-tests, state and configuration abstractions, documentation. On PyPI and in Debian.
The Open Observatory of Network Interference, is a global observation network which aims is to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the various types, methods, and amounts of network tampering in the world.