tor-router VS TorghostNG

Compare tor-router vs TorghostNG and see what are their differences.

tor-router

A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase privacy/anonymity without extra unnecessary code. (by Edu4rdSHL)

TorghostNG

TorghostNG - Make your internet traffic anonymized through Tor network and Privoxy. Rewritten from TorGhost with Python 3 (by githacktools)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
tor-router TorghostNG
3 4
267 320
- -
4.7 4.7
3 months ago almost 3 years ago
Shell Python
GNU General Public License v3.0 only GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tor-router

Posts with mentions or reviews of tor-router. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-09-07.

TorghostNG

Posts with mentions or reviews of TorghostNG. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-09-07.

What are some alternatives?

When comparing tor-router and TorghostNG you can also consider the following projects:

nipe - An engine to make Tor network your default gateway

torghost - TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.