Stars
-
OnionHop combines Proxy mode and TUN/VPN mode, supports bridges, and provides logs that explain what is happening.
OnionHop is built around predictable behavior: explicit modes, explicit routing, and explicit diagnostics.
Route proxy-aware apps through a local SOCKS endpoint without requiring administrator rights.
Use system-wide routing with sing-box and Wintun for apps that ignore proxy settings.
Choose which applications use Tor and which stay direct in Hybrid mode.
Automatically selects the most reliable connection strategy for the current network.
Scriptable command-line workflow for automation, headless systems, and advanced users.
Use snowflake, obfs4, meek-azure, webtunnel, or custom bridge lines.
Optional firewall protection helps prevent leaks in strict TUN configuration.
Review app and network logs to identify bridge and connectivity issues quickly.
Select DNS providers for routed traffic and enable the optional .onion DNS proxy listener.
Watch a quick walkthrough of OnionHop in action.
Release data is loaded from the GitHub API. Switch between GUI and CLI categories to keep file lists focused.
-
Loading release data...
Yes in many places, but no or restricted in some jurisdictions. You are responsible for following local laws.
Yes. OnionHop has native options for this: use System proxy (SOCKS browser/.onion) and/or enable .onion DNS proxy in Settings (requires Administrator).
TUN mode uses the Wintun driver and can apply firewall rules for strict kill switch behavior.