OnionShare alternatives

Looking for an alternative tool to replace OnionShare? During the review of OnionShare we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. MISP (Malware Information Sharing Platform)
  2. Cryptomator (client-side encryption for cloud services)
  3. socat (data channel and transfer tool)

These tools are ranked as the best alternatives to OnionShare.

Alternatives (by score)

100

MISP

Introduction

MISP collects, stores, and distributes security indicators and discovered threats. This makes the platform useful for those involved with security incidents and malware research. Users benefit from having a well-tested platform to structure the vast number of data points available when it comes to security threats. The tooling allows interaction with other tools, like security incident and event management (SIEM) and intrusion detection systems (IDS).

Project details

MISP is written in PHP.

Strengths and weaknesses

  • + More than 50 contributors
  • + The source code of this software is available

    Typical usage

    • Fraud detection
    • Information gathering
    • Threat hunting

    MISP review

    100

    Cryptomator

    Introduction

    Cryptomator is a multi-platform tool for transparent client-side encryption of your files. It is used together with cloud services to ensure you are the only one who can access the data.

    Project details

    Cryptomator is written in Java.

    Strengths and weaknesses

    • + More than 10 contributors
    • + More than 2000 GitHub stars
    • + Many releases available

      Typical usage

      • Data encryption

      Cryptomator review

      59

      socat

      Introduction

      Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.

      Project details

      socat is written in C.

      Strengths and weaknesses

      • + The source code of this software is available
      • + Well-known tool

        Typical usage

        • Data encryption
        • Data transfers

        socat review

        96

        Samba

        Introduction

        Since 1992, Samba provides file and print services based on the server message block (SMB) protocol. This protocol was released by Microsoft as part of the open specifications.

        Samba helps with interoperability between systems running Microsoft Windows and those running one of the flavor of Unix like Linux. The toolkit allows systems to become part of the Active Directory environment and join a domain controller or domain member.

        Project details

        Strengths and weaknesses

        • + The source code of this software is available

          Samba review

          93

          BleachBit

          Introduction

          With the help of BleachBit, the system can be kept clean and increase privacy in the process.

          Items that can be cleaned by BleachBit include:


          • Browser cache

          • Cookies

          • Internet history

          • Temporary files

          • Log files

          The tool can 'shred' files to ensure the data can no longer be retrieved, opposed to just deleting it.

          Project details

          63

          Decentraleyes

          Introduction

          Most websites consist of HTML show the structure of a website. Together with CSS for styling, and JavaScript for interactive functionality, the website can provide value for its visitors. Some of the used JavaScript libraries are heavy on bandwidth, so website owner may use a content delivery network (CDN). The primary goal for a CDN is to get data closer to the end-user, which results in faster downloads and increasing the performance of the website.

          Some common JavaScript libraries are used on many websites. As not every single website creator can pay the costs of a CDN, bigger companies might actually sponsor bandwidth on their CDN edge servers. While this is great from a cost perspective, it also introduces a privacy concern. The owner of the CDN can exactly see what websites a user is visiting by looking at the related requests to the CDN and the related referrer. This is where Decentraleyes comes into place, by intercepting requests to content delivery networks (CDN).

          Project details

          Decentraleyes is written in JavaScript.

          Strengths and weaknesses

          • + More than 1000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Privacy enhancement

            Decentraleyes review

            97

            hBlock

            Introduction

            For the privacy-aware users, tools like hBlock can be helpful to block malicious domains, malware, advertisements, and trackers. Trackers could be pixels added to websites to track which pages you visited, which might invade your privacy.

            Project details

            hBlock is written in shell script.

            Strengths and weaknesses

            • + Used language is shell script
            • + The source code of this software is available

              Typical usage

              • Malware protection
              • Privacy enhancement
              • Provide anonymity

              hBlock review

              63

              MAT (Metadata Anonymisation Toolkit)

              Introduction

              Many file forms store sensitive data, like a location, author name, or even the date and time. This toolkit can remove these bits of data while allowing the file to be used as before.

              Project details

              MAT is written in Python.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Privacy enhancement

                MAT review

                100

                Privacy Badger

                Introduction

                Privacy Badger provides protection against website visitor trackers. These trackers come in the form of beacons or invisible pixels and have the goal to collect information about the browser. This data is often shared by third parties and used to create a profile of a particular browser. As minor differences for each user may lead to an individual user, these third parties may even link some of the data to the related individual. Tools like Privacy Badger do not provide guarantees that they block everything, yet can decrease the amount of data greatly.

                Project details

                Privacy Badger is written in JavaScript.

                Strengths and weaknesses

                • + More than 50 contributors
                • + The source code of this software is available
                • + Supported by a large company
                • + Well-known tool
                • - Many provided pull requests are still open

                Typical usage

                • Privacy enhancement

                Privacy Badger review

                76

                exitmap

                Introduction

                A tool like exitmap might be useful to monitor the reliability and trustworthiness of Tor exit relays. The Tor Project actually uses exitmap to check for false negatives and find malicious exit relays. These are related to the check service page of the project.

                Project details

                Some relevant tool missing as an alternative to OnionShare? Please contact us with your suggestion.