14 Integrations with Tor Browser
View a list of Tor Browser integrations and software that integrates with Tor Browser below. Compare the best Tor Browser integrations as well as features, ratings, user reviews, and pricing of software that integrates with Tor Browser. Here are the current Tor Browser integrations in 2026:
-
1
Kasm Workspaces
Kasm Technologies
Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.Starting Price: $0 Free Community Edition -
2
Netdata
Netdata, Inc.
The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.Starting Price: Free -
3
Bitwarden
Bitwarden
Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store and share sensitive data with end-to-end encryption. Share Encrypted Information - Share your sensitive information safely and securely with individuals, teams, and enterprises. - Transmit encrypted information via a secure link to anyone through your preferred communication channel like text or email. Make Password Management Convenient - Generate and store your strong and unique passwords all in one place. - Access account credentials from anywhere, on any device with secure cloud syncing. - Bitwarden offers multiple client options to access your password vault including desktop, mobile, browser, web, and CLI. - Autofill makes it easy to quickly and securely log in to accounts. Strengthen Your Security - Identify potential security weaknesses like reused, exposed, or weak passwords, and other helpful data security metrics.Starting Price: $4 per month -
4
Qubes OS
Qubes OS
Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes. These qubes, which are implemented as virtual machines (VMs), have specific Purposes with a predefined set of one or many isolated applications, for personal or professional projects, to manage the network stack, the firewall, or to fulfill other user-defined purposes. Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. Can't decide which Linux distribution you prefer? Still, need that one Windows program for work? With Qubes, you're not limited to just one OS. With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy.Starting Price: Free -
5
Anonymous Messenger
Anonymous Messenger
A peer-to-peer private anonymous and secure messenger that works over Tor. It's also free and open source software which gives users the freedom of changing it and redistributing it under the terms of the GNU General Public License v3. Anonymous Messenger utilizes Tor for its anonymity network and data transport security using the onion v3 protocol and the ability to run onion services on any device and connect directly and anonymously without having to set up any servers, also it uses the signal protocol to encrypt all data before sending it over the Tor network directly to the intended receiver, which means we get two layers of end-to-end encryption without using any server or service. Instead of using HTTP Anonymous Messenger, uses its own transport protocol which is written for anonymity and simplicity. For example, when we send a message we encrypt it using the Signal protocol then we establish an onionV3 encrypted connection and send the encrypted message.Starting Price: Free -
6
BitHide
BitHide
BitHide is a Hong Kong–registered crypto wallet software provider operating since 2021, offering a non-custodial infrastructure that enables businesses to accept cryptocurrency payments, manage asset flows, and automate financial operations with full confidentiality. Its proprietary privacy tools include IP address rotation, temporary fee-payment addresses, and adjustable Transaction Safety Levels, while companies retain complete control over their funds and private keys. The platform supports unlimited wallets in a single workspace, automated mass payouts, withdrawals, AML checks, crypto payroll, TRON fee optimisation for USDT TRC-20, and built-in modules such as AML screening and Crypto Swap. BitHide integrates through API, widgets, or custom payment pages and has been featured in major global media, including Reuters, Benzinga, Business Insider, PYMNTS, The Defiant, and Cryptopolitan. -
7
NexVision
NexVision Lab
NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.Starting Price: Free -
8
FireShot
FireShot
Simple and intuitive user interface makes your work with FireShot Pro more comfortable, easier and faster. FireShot Pro includes a built-in image editor. You can edit screenshots instantly after taking them or make extra changes later. FireShot Pro captures web pages and saves screenshots locally on your PC. You can turn off the internet, and FireShot will still work seamlessly. FireShot Pro integrates with your browser. By doing this, FireShot can capture web pages entirely providing a high quality output. It's possible to capture a selection or just a visible part of the web page. You can also capture all open tabs in one click. There's no need to run an external editor to quickly resize, crop, highlight, blur, or erase desired elements. It's also extremely easy to add some quick text annotations! With FireShot you can save captures to disk as PDF (with direct links and searchable text), PNG, GIF, JPEG or BMP.Starting Price: $39.95 one-time payment -
9
SnowHaze
SnowHaze
SnowHaze empowers you to take back control over your personal data, and we spare no effort to provide you the most secure browsing experience and internet access. SnowHaze offers a browser with your privacy and security in mind. It blocks invasive ads and trackers, protects you from browser fingerprinting, is lightning fast, and much more. SnowHaze offers a VPN service that, thanks to its novel protocol "Zero-Knowledge Auth," it does not need user accounts. Not even SnowHaze can track its users, it is the combination of a great browser and a new generation VPN that sets SnowHaze apart and makes it the most private and most secure browser on iOS. You can protect your IP address and access location-specific contents by changing your perceived location.Starting Price: $4.58 per month -
10
AWS Marketplace
Amazon
AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs. -
11
Live Proxies
Live Proxies
Here at Live, we provide unique, stable, and unblocked proxies for any use case or site. We work diligently to make sure our proxies meet your expectations. Leverage your experience with our anonymous, real-peer-rotating residential proxies. Enjoy keeping the same residential IPs for 30 days or longer. Have the liberty of becoming a mobile user with our stable mobile IPs. Get unrestricted access to the web data; no limits, no boundaries. Navigate through stringent proxy restrictions and facilitate your web scraping tasks. From tracking competitor prices to capturing market trends, use our proxies to effortlessly collect and analyze data from multiple online sources. Optimize your pricing strategy and manage your inventory efficiently by acquiring valuable insights into your competition, products, and markets. Automate tasks and streamline operations to save time and minimize resources.Starting Price: $45 per month -
12
Breachsense
Breachsense
Protect your organization & staff from data breaches. Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data breaches in real-time enabling you to prevent cyber threats before they happen. Uncover your company’s breached data and malware-infected devices. Track open, deep, and dark web sources such as Tor websites, private ransomware IRC and Telegram channels, criminal forums, and cybercrime marketplaces. Continuous monitoring enables your team to uncover data breaches related to your VIPs, executive team members, employees as well as clients. Find exposed user & employee credentials, ransomware leaks as well as exposed company data being sold or traded on criminal marketplaces and private ransomware forums. Breachsense continuously monitors the internet for sensitive company information such as account credentials, employee details, leaked company data, session tokens, 3rd party data leaks, and more. -
13
Pryvate Messenger
Pryvate Messenger
Pryvate Messenger is a secure communication platform that prioritizes user privacy by utilizing serverless technology, man-in-the-middle flagging, and robust encryption. It offers features such as anonymous registration, allowing users to sign up without a SIM card, and self-destructing messages that can be set to auto-delete, leaving no trace behind. The app ensures no third-party tracking and retains no metadata, safeguarding user information. Users can make high-quality voice and video calls both on and off-network without compromising security. The platform also includes a Pryvate Onion Browser for ad-less web browsing via Tor/I2P, secure instant messaging for exchanging various media, and a unified DeFi wallet for fiat and crypto payments. Additional functionalities include remote wipe capabilities, allowing users to delete messages from both their device and the recipient's, and anti-blocking technology that ensures uninterrupted, secure communication. -
14
Chronicle SOAR
Chronicle
Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat.
- Previous
- You're on page 1
- Next