Top 15 HiddenService.Net Alternative and Similar Softwares | Dec 2024

Tor and I2P in proxy. Just like tor2web, access .onion and .i2p domains without running Tor or I2P.

1. Tor-ramdisk

Tor-ramdisk Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to construct encrypted virtual tunnels which are randomly relayed between Tor servers (nodes) until the connection......

2. Onion.nu

Onion.nu Caching proxy for the i2p and tor networks......

3. Onion.guide

Onion.guide Using this gateway you can securely access any .onion or .i2p hidden service without a Tor Browser or I2P installation.......

4. JonDoFox

JonDoFox JonDoFox is a profile for the Mozilla Firefox web browser particularly optimized for anonymous and secure web surfing. For anonymous surfing you need an IP changer proxy too. We recommended our proxy tool JonDo but you may use other anonymsation services like Tor Onion Router.......

5. NovelVPN

NovelVPN NovelVPN provide VPN Services with high speed, unlimited bandwidth, most secure, multiple geo-locations. Protect all your internet traffic and Bypassing Blocks. Sign-up Now!......

6. Torifier

Torifier Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor software and will manage it for you.......

7. Surf Anonymous Free

Surf Anonymous Free Surf Anonymous Free functions as changing your real IP address and identity while browsing the web via delivering users fresh anonymous proxy servers. The mission of Surf Anonymous Free is Making your online activities—E-mail‚ shopping‚ chat‚ all the things you do online—private and secure. Whether you're surfing the Web, shopping......

8. Charon

Charon Searches Google for open proxies and includes a full anonymity checker. It provides a fully customisable way of filtering out unwanted proxies via control files, a proxy tester to check anonymity - and a fully functional search engine crawler to find lists of posted proxies. Included within the kit is......

9. OnionCat

OnionCat OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It allows users to anonymously access Internet services. It transmits any kind of IPv6-based data transparently through the TOR network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. OnionCat......

10. Phantom

Phantom The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind:1. Completely decentralized.2. Maximum resistance against all kinds of DoS attacks.3. Theoretically secure anonymization.4. Theoretically secure end-to-end transport encryption.5. Completely (virtually) isolated from the "normal" Internet.6. Maximum......

11. Orbot

Orbot Orbot is an open source Tor Proxy App for Android Phones. If the phone is rooted, it can even transparently route all phone internet traffic through the Tor network. Should be installed alongside Orweb, an open source Tor web browser that will automatically use......

12. onion.lt

onion.lt Sorry, we have added any description on onion.lt......

13. orWall

orWall orWall will force selected applications through Orbot while preventing unchecked applications to have network access.In short, orWall will add special iptables rules in order to redirect traffic for applications through Tor it will also add required rules in order to block traffic for other apps.The......

14. Onion.casa

Onion.casa Tor gateway. Browse .onion sites without downloading any new software.......

15. I2P

I2P I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.Many applications are available that interface with I2P, including mail, peer-peer, IRC chat......