What Integrates with Tor Browser?
Find out what Tor Browser integrations exist in 2024. Learn what software and services currently integrate with Tor Browser, and sort them by reviews, cost, features, and more. Below is a list of products that Tor Browser currently integrates with:
-
1
Netdata, Inc.
Free 20 RatingsMonitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation. -
2
Bitwarden
Bitwarden
$4 per month 11 RatingsWith an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment. -
3
Qubes OS is an open-source, free, security-oriented operating platform for single-user desktop computing. Qubes OS uses Xen-based virtualization for the creation and management a set of isolated compartments known as qubes. These qubes are virtual machines (VMs) that are used to implement a set of isolated applications for professional or personal projects. They also serve to manage the firewall and network stack. Qubes provides your computer with the security of Xen hypervisor, which is used by many major hosting companies to isolate websites from each other. You can't decide which Linux distribution to use? You still need one Windows program for work? Qubes doesn't limit you to one OS. Qubes integrates Whonix, making anonymous browsing over the Tor network safe and simple.
-
4
Anonymous Messenger
Anonymous Messenger
Free 1 RatingA peer-topeer anonymous and secure private messenger that uses Tor. It is also open-source software that allows users to modify it and re-distribute it under the GNU General Public License version 3. Anonymous Messenger uses Tor as its anonymity network, and data transport security, using the onion protocol v3. It can be run on any device, and users can connect directly anonymously, without the need to set up servers. Also, it uses the Signal protocol to encrypt data before sending it directly over the Tor network to the intended recipient, meaning we get two layers end-to-end without using any service or server. Instead of using HTTP, Anonymous Messenger uses its own transport protocols that are written for anonymity. When we send a message, we encrypt it with the Signal protocol and then establish an onionV3 encryption connection to send the encrypted message. -
5
Kasm Technologies
$0 Free Community Edition 46 RatingsKasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid. -
6
SnowHaze
SnowHaze
$4.58 per monthSnowHaze allows you to regain control of your personal data. We make every effort to ensure that you have the best browsing experience and secure internet access. SnowHaze is a browser that protects your privacy and security. It blocks intrusive ads and trackers, protects against browser fingerprinting, and is lightning fast. SnowHaze allows you to regain control of your personal data. SnowHaze protects your data from Ads and other sneaky tracking methods. -
7
NexVision
NexVision Lab
FreeNexVision is a platform powered by AI that provides real-time, multi-layered information gathering and cyber security. It provides deep, contextual intelligence that includes targets, motivations and threat analytics. The platform's advanced algorithm discovers more than 120,000 hidden Tor websites daily, allowing users to access the dark and deep web without needing anonymizing browsers such as Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The dashboard is user-friendly and allows users to set keyword alerts, conduct investigations, and analyze results while maintaining anonymity. NexVision helps organizations safeguard their assets while maintaining a secure online environment. -
8
FireShot
FireShot
$39.95 one-time paymentFireShot Pro's intuitive user interface makes it easier, faster, and more enjoyable to use. FireShot Pro comes with an integrated image editor. You can instantly edit your screenshots after taking them, or make additional changes later. FireShot Pro captures web pages, and saves them locally to your computer. FireShot Pro can be turned off, but it will still work seamlessly. FireShot Pro can integrate with your browser. FireShot Pro can capture web pages completely, providing a high-quality output. You can capture only a selected portion of the web page or a subset. All open tabs can be captured in one click. To quickly resize or crop, highlight, blurr, blur or erase elements, you don't need to open an external editor. You can also add text annotations quickly! FireShot allows you to save captures to disk in PDF (with searchable text and direct links), PNG, GIF or BMP. -
9
AWS Marketplace
Amazon
AWS Marketplace is an online catalog that allows customers to discover, buy, deploy and manage third-party products, data and services within the AWS ecosystem. It offers thousands of listings in categories such as security, machine-learning, business applications, DevOps, and more. AWS Marketplace offers flexible pricing models, such as pay-as you-go, annual subscriptions and free trials. This simplifies billing and procurement by integrating costs in a single AWS bill. It also supports rapid implementation with pre-configured applications that can be launched using AWS infrastructure. This streamlined approach allows companies to accelerate innovation, reduce the time-to market, and maintain better controls over software usage and cost. -
10
Live Proxies
Live Proxies
$45 per monthLive provides unblocked, unique, and stable proxies that can be used for any site or use case. We strive to meet your expectations. Use our residential proxies that rotate anonymously by real peers to enhance your experience. Enjoy the same residential IPs 30 days or more. Our stable mobile IPs give you the freedom to become a mobile user. No limits, no boundaries. Get unlimited access to web data. You can navigate through proxy restrictions to facilitate your web scraping. Our proxies can be used to easily collect and analyze data, from tracking competitor prices to capturing trends in the market. By gaining valuable insights about your competitors, products, and markets, you can optimize your pricing strategy and manage inventory efficiently. Automate tasks and streamline your operations to save resources and time. -
11
Chronicle SOAR
Chronicle
Playbooks can be used to speed up time-to-value, and allow for easy scaling as you grow. You can address common problems like ransomware and phishing with ready-to-use use cases that include playbooks, simulated alarms, and tutorials. Drag and drop is all it takes to create playbooks that organize hundreds of the tools that you rely upon. Automate repetitive tasks to help you respond faster and make more time for high-value work. Optimize, troubleshoot and iterate playbooks using lifecycle management capabilities such as run analytics, reusable blocks, version control, rollback, and run analytics. Integrate threat intelligence at each step and visualize the most relevant contextual data for each threat, including who did what and when, and the relationships between all entities attached to an event or product. The patent-pending technology automatically groups related alerts into one threat-centric case. This allows a single analyst the ability to efficiently investigate and respond. -
12
BitHide
BitHide
BitHide's white-label solution allows you to create your own brand wallet, without having to invest in its development. BitHide reveals real anonymity, a simplified design, and advanced administration functionality. If you want to avoid the development of your crypto wallet but still don't want to use a third party-branded solution for crypto payments, then buy the white-label cryptocurrency BitHide. It offers the same functionality as the company's users, but allows you to brand the solution according to your brand book. You can do everything you are used to with your crypto wallet. This includes storing and encrypting your transaction information, as well as transferring and accepting cryptocurrency. Install BitHide to store all transaction data on your own servers. Create multiple crypto addresses and manage them all in one account. -
13
Breachsense
Breachsense
Protect your organization and staff from data breaches. Breachsense monitors dark web, private hackers forums, and criminal marketplaces in order to detect data breaches before they occur. Discover the malware-infected and breached devices in your company. Track open, dark, and deep web sources, such as Tor websites and private ransomware IRC channels and Telegram channels. Your team can uncover data breaches involving VIPs, executives, employees, and clients through continuous monitoring. Find exposed user and employee credentials, ransomware leaked data as well as exposed company information being sold or traded in criminal marketplaces and private forums. Breachsense constantly monitors the Internet for sensitive company data such as account credentials and employee details. It also looks out for leaked company data.
- Previous
- You're on page 1
- Next