Tor
Featured⚖️ Dual Use · C
Tor (The Onion Router) is free software and an open network that helps defend against traffic analysis. It directs Internet traffic through a worldwide overlay network of relays to conceal a user's location and usage from surveillance and traffic analysis. Tor is used by journalists, activists, whistleblowers, and privacy-conscious individuals — but also by threat actors for anonymous operations, C2 infrastructure, and accessing dark web markets. Understanding Tor is essential for both operational security and investigating dark web activity.
Use Cases
- Anonymous internet browsing and communication
- Accessing .onion hidden services for investigation
- Censorship circumvention
- Operational security for sensitive research
- C2 infrastructure concealment (offensive)
- Dark web OSINT and monitoring
Tags
Details
- Category
- ⚖️ Dual Use
- Language
- C
- Repository
- torproject/tor
Platforms
More in Dual Use
ProxyChains-ng
CForce any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.
Socat
CMultipurpose relay tool. Bidirectional data transfer between two data channels — sockets, files, pipes, devices.
ngrok
GoExpose local servers to the internet via secure tunnels. Instant public URLs for localhost services.
Rclone
Gorsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.
GTFOBins
ShellCurated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.
LOLBAS
ShellLiving Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.