What Integrates with Tor Browser?

Find out what Tor Browser integrations exist in 2024. Learn what software and services currently integrate with Tor Browser, and sort them by reviews, cost, features, and more. Below is a list of products that Tor Browser currently integrates with:

  • 1
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    $0 Free Community Edition
    121 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 2
    Netdata Reviews
    Top Pick

    Netdata, Inc.

    Free
    18 Ratings
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 3
    Bitwarden Reviews
    Top Pick

    Bitwarden

    Bitwarden

    $4 per month
    11 Ratings
    With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
  • 4
    Qubes OS Reviews
    Qubes OS is an open-source, free, security-oriented operating platform for single-user desktop computing. Qubes OS uses Xen-based virtualization for the creation and management a set of isolated compartments known as qubes. These qubes are virtual machines (VMs) that are used to implement a set of isolated applications for professional or personal projects. They also serve to manage the firewall and network stack. Qubes provides your computer with the security of Xen hypervisor, which is used by many major hosting companies to isolate websites from each other. You can't decide which Linux distribution to use? You still need one Windows program for work? Qubes doesn't limit you to one OS. Qubes integrates Whonix, making anonymous browsing over the Tor network safe and simple.
  • 5
    Anonymous Messenger Reviews
    A peer-topeer anonymous and secure private messenger that uses Tor. It is also open-source software that allows users to modify it and re-distribute it under the GNU General Public License version 3. Anonymous Messenger uses Tor as its anonymity network, and data transport security, using the onion protocol v3. It can be run on any device, and users can connect directly anonymously, without the need to set up servers. Also, it uses the Signal protocol to encrypt data before sending it directly over the Tor network to the intended recipient, meaning we get two layers end-to-end without using any service or server. Instead of using HTTP, Anonymous Messenger uses its own transport protocols that are written for anonymity. When we send a message, we encrypt it with the Signal protocol and then establish an onionV3 encryption connection to send the encrypted message.
  • 6
    SnowHaze Reviews

    SnowHaze

    SnowHaze

    $4.58 per month
    SnowHaze allows you to regain control of your personal data. We make every effort to ensure that you have the best browsing experience and secure internet access. SnowHaze is a browser that protects your privacy and security. It blocks intrusive ads and trackers, protects against browser fingerprinting, and is lightning fast. SnowHaze allows you to regain control of your personal data. SnowHaze protects your data from Ads and other sneaky tracking methods.
  • 7
    FireShot Reviews

    FireShot

    FireShot

    $39.95 one-time payment
    FireShot Pro's intuitive user interface makes it easier, faster, and more enjoyable to use. FireShot Pro comes with an integrated image editor. You can instantly edit your screenshots after taking them, or make additional changes later. FireShot Pro captures web pages, and saves them locally to your computer. FireShot Pro can be turned off, but it will still work seamlessly. FireShot Pro can integrate with your browser. FireShot Pro can capture web pages completely, providing a high-quality output. You can capture only a selected portion of the web page or a subset. All open tabs can be captured in one click. To quickly resize or crop, highlight, blurr, blur or erase elements, you don't need to open an external editor. You can also add text annotations quickly! FireShot allows you to save captures to disk in PDF (with searchable text and direct links), PNG, GIF or BMP.
  • 8
    Chronicle SOAR Reviews
    Playbooks can be used to speed up time-to-value, and allow for easy scaling as you grow. You can address common problems like ransomware and phishing with ready-to-use use cases that include playbooks, simulated alarms, and tutorials. Drag and drop is all it takes to create playbooks that organize hundreds of the tools that you rely upon. Automate repetitive tasks to help you respond faster and make more time for high-value work. Optimize, troubleshoot and iterate playbooks using lifecycle management capabilities such as run analytics, reusable blocks, version control, rollback, and run analytics. Integrate threat intelligence at each step and visualize the most relevant contextual data for each threat, including who did what and when, and the relationships between all entities attached to an event or product. The patent-pending technology automatically groups related alerts into one threat-centric case. This allows a single analyst the ability to efficiently investigate and respond.
  • 9
    BitHide Reviews
    BitHide's white-label solution allows you to create your own brand wallet, without having to invest in its development. BitHide reveals real anonymity, a simplified design, and advanced administration functionality. If you want to avoid the development of your crypto wallet but still don't want to use a third party-branded solution for crypto payments, then buy the white-label cryptocurrency BitHide. It offers the same functionality as the company's users, but allows you to brand the solution according to your brand book. You can do everything you are used to with your crypto wallet. This includes storing and encrypting your transaction information, as well as transferring and accepting cryptocurrency. Install BitHide to store all transaction data on your own servers. Create multiple crypto addresses and manage them all in one account.
  • Previous
  • You're on page 1
  • Next