Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 23 onion Open-Source Projects
-
OnionBrowser
An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
-
Project mention: Launching Osint Industries: Discover Your Digital Footprint in Realtime | news.ycombinator.com | 2023-08-09
Greetings, HN community. We are excited to share OSINT Industries, a platform dedicated to real-time open-source intelligence (OSINT) pertaining to phone numbers and emails.
About OSINT Industries:
Realtime Analysis: We provide an up-to-the-moment enrichment tool for emails, and phone numbers.
Real-Time Intelligence: We refrain from using databases. Every piece of data is fetched in real-time, ensuring its accuracy and timeliness. None of the queries or results are stored.
Extensive Reach: Our tool can identify associated accounts linked to a particular email or phone number from over 200 websites.
Detailed Insights: Beyond basic association, our system can pull additional data points, such as images, map locations, and more.
Pedigree: Our foundation is built upon proven tools our team made in the past like Holehe (https://github.com/megadose/holehe), GHunt (https://github.com/mxrch/GHunt), and onionsearch (https://github.com/megadose/OnionSearch).
User Base: Within 3 months of our inception, we've got over 350k registered users.
Trust & Reliability: Our tool has been integrated by various global law enforcement agencies, showcasing its reliability and utility.
Try the tool for free to discover the digital footprint of your email and phone number. The first 5 searches are free: https://osint.industries
We offer API access to enterprises, if you're interested in that contact me on [email protected].
As our tool deals with data that some may view as sensitive, I think it is also important to link our policies here which govern our ethics, and data processing.
Trust & Safety (our ethics): https://osint.industries/trust
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
-
Onion-architecture-ASP.NET-Core
WhiteApp API solution template which is built on Onion Architecture with all essential feature using .NET 5!
-
Project mention: tor-socks-proxy VS YiLuProxy - a user suggested alternative | libhunt.com/r/tor-socks-proxy | 2023-04-13
-
freshonions-torscraper
Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion
-
The internet is no longer as peer-to-peer friendly as it once was. Hence the existence of commercially-motivated hacks run by third parties such as hosting, e.g., Cloudflare, etc., including tunneling, e.g., ngrok, etc. Alternatively, Tor relies on third parties but AFAIK it's not so centralised and it's not commercially-motivated.
That is what differentiates it from all the other options. There is no company behind it trying to make money by exploiting internet subscribers trying to connect with each other (not the so-called "tech" company).
Tor can have uses other than the ones normally discussed such as anonymity and evading censorship. Tor can provide reachability without use of commercial eavesdropping third party intermediaries.
For example, one can use Onion Services for advertising open IP:port information that is needed for peer-to-peer connections over other, faster peer-to-peer overlay networks, not the Tor network. The Onion Service can function as the "rendezvous" server for making peer-to-peer connection outside of Tor. Tor's Onion Services can be used to exchange IP:port information for making direct connections over the internet without using Tor. No need to use commercial third parties. Ngrok, Tailscale, etc. all require use of servers run by a commercial third party. Tor does not. There is ample free software that can establish peer-to-peer connections over the internet but in every case it requires some reachable server running this software on the internet, and for most users that means they have to run a server and pay a commercial third party for hosting. Tor has no such requirement.
Imagine being able to share content with family, friends, colleagues without the need for so-called "tech" companies^1 acting as intermediaries ("middlemen"). With a reachable IPv4 address this becomes possible. It would be nice if every home internet access subscriber received a reachable IPv4 address from their ISP. No doubt, some do. But on today's internet most do not. The so-called "tech" companies all have reachable IPv4 addresses. Hence they assume the roles of middlemen and use this position to exploit internet subscribers for profit.
Something like Tor provides a solution. Again, it is not always necessary to route all traffic over Tor. Tor can have other uses. When the goal is simply peer-to-peer connections, Onion Services can be used to bootstrap peer-to-peer overlay connections using the user's choice of software by providing a secure, reliable way to exchange IP:port information. Goal here when using Tor is not anonymity nor censorship evasion, it's reachability. Similarly, goal of peer-to-peer is not necessarily anonymity nor evading censorship either, it's bypassing commercially-motivated, eavesdropping middlemen known as "tech" companies, and avoiding the annoyances of advertising. A possible additional benefot of using Tor in this way is elevated privacy. Google, for example, cannot easily discover Onion Services. No one can discover Onion Services using ICANN DNS.
1. The term "tech" as in "tech company" means a company, usually a website, that collects data from and about people to support the sale of advertising services because advertising services are the only services the company can sell on a scale large enough to sustain a profitable business.
More reading/viewing:
https://github.com/anderspitman/awesome-tunneling
Tor Hidden Services (now called "Onion Services")
https://jamielittle.org/2016/08/28/hidden.html
As one author wrote on Github:
"onion-expose is a utility that allows one to easily create and control temporary Tor onion services.
onion-expose can be used for any sort of TCP traffic, from simple HTTP to Internet radio to Minecraft to SSH servers. It can also be used to expose individual files and allow you to request them from another computer.
Why not just use ngrok?
ngrok is nice. But it requires everything to go through a central authority (a potential security issue), and imposes artificial restrictions, such as a limit of one TCP tunnel per user. It also doesn't allow you to expose files easily (you have to set it up yourself)."
https://github.com/ethan2-0/onion-expose
As another Github contributor put it:
"With onionpipe, that service doesn't need a public IPv4 or IPv6 ingress. You can publish services with a globally-unique persistent onion address, and share access securely and privately to your own allowlist of authorized keys.
You don't need to rely on, and share your personal data with for-profit services (like Tailscale, ZeroTier, etc.) to get to it."
https://github.com/cmars/onionpipe
https://news.ycombinator.com/item?id=36734956
https://news.ycombinator.com/item?id=30445421
https://news.ycombinator.com/item?id=29929399
"Finally, onion services are private by default, meaning that users must discover these sites organically, rather than with a search engine." [Small websites with small audiences get buried by advertising-supported search engines anyway.]
https://nymity.ch/onion-services/pdf/sec18-onion-services.pd...
https://media.ccc.de/v/31c3_-_6112_-_en_-_saal_2_-_201412301...
https://wiki.termux.com/wiki/Bypassing_NAT (Termux recommends Tor over Ngrok)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
-
hiphp
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
-
onionfruit
OnionFruit™ Connect - Tor access client with country selection, bridge configuration, pluggable transports and experimental DNS support
This is a closed-source program and if you have issues with it the instructions say to file an issue here: https://github.com/dragonfruitnetwork/onionfruit/issues
-
FullyNoded
Self sovereign, secure, powerful, easy to use wallet that utilizes your own node as a backend. Powered by PSBT's and descriptors. Acts as an offline signer using your node as a watch-only wallet. C-Lightning compatible for instant, unfairly cheap payments.
-
-
-
Project mention: aria2-onion-downloader - Download from .onion-domains more quickly | /r/onions | 2023-07-04
-
-
-
Project mention: onion-links VS OnionLinksV3 - a user suggested alternative | libhunt.com/r/onion-links | 2024-01-01
01kevin01 onionlinks v3 reporistry great and project have more links...
-
-
The main difference with other roles, like this one from systemli, is that it is more generic. It is not tied to a specific setup and has been tested with OpenBSD, Archlinux and Debian.
-
-
accumulator
:rocket: Send a load of requests with nodejs using cluster and with/without Tor for anonymisation :see_no_evil:
-
snowflake-cli
A simple python script for hosting a Snowflake Proxy in your python program or with it's standalone cli (by gp2112)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
onion related posts
- aria2-onion-downloader - Download from .onion-domains more quickly
- Speed up large file download
- Go-libp2p-tor-transport: A TOR transport for libp2p
- I Just made a Snowflake python module that you can run inside your software or by CLI
- Does snowflake help circumvent current censorship in russia?
- I Just made a CLI version of Snowflake if you want to host it in a server
- How common are flood attacks on tor websites?
-
A note from our sponsor - InfluxDB
www.influxdata.com | 28 Mar 2024
Index
What are some of the best open-source onion projects? This list will help you:
Project | Stars | |
---|---|---|
1 | OnionBrowser | 2,188 |
2 | OnionSearch | 1,073 |
3 | multitor | 991 |
4 | Onion-architecture-ASP.NET-Core | 763 |
5 | tor-socks-proxy | 488 |
6 | freshonions-torscraper | 476 |
7 | awesome-tor | 390 |
8 | Attacks-on-Tor | 249 |
9 | EndGame | 199 |
10 | hiphp | 195 |
11 | onionfruit | 193 |
12 | FullyNoded | 189 |
13 | TorCrawl.py | 182 |
14 | oniongen-go | 126 |
15 | aria2-onion-downloader | 117 |
16 | tor-controller | 89 |
17 | go-libp2p-tor-transport | 48 |
18 | OnionLinksV3 | 41 |
19 | Lokiap-webgui | 25 |
20 | ansible-role-onion | 21 |
21 | chatNT | 11 |
22 | accumulator | 8 |
23 | snowflake-cli | 6 |