What is the Hidden Wiki?
The Hidden Wiki is a curated directory of .onion websites accessible only through the Tor network. It functions as a navigational index for the dark web, organizing hidden wiki links into categorized sections including marketplaces, forums, privacy tools, email services, and whistleblower platforms. For users seeking a complete darknet market list, this type of directory remains essential.
Conventional search engines like Google and DuckDuckGo cannot crawl .onion addresses. Deep web links and dark web links are invisible to standard crawlers. Without directories, discovering hidden services would require prior knowledge of each site's 56-character address. The Hidden Wiki and sites like TorWiki solve this by maintaining verified, categorized link databases with only working darknet links.
How TorWiki Differs from Legacy Directories
Unlike the original Hidden Wiki, which was community-edited and frequently vandalized, TorWiki maintains editorial control over every listing. In 2025 alone, over 12,000 phishing clones of popular .onion sites were detected across the dark web. Legacy wikis linked to many of them. TorWiki's verification process eliminates this risk entirely.
We do not host user-generated content, do not require registration, and do not run tracking scripts. The site is designed to work with JavaScript disabled and loads efficiently over the Tor network. For a deep understanding of darknet terminology, explore our darknet glossary with 160+ defined terms.
How to Access the Dark Web
Accessing .onion sites requires the Tor Browser, a free, open-source browser that routes traffic through an encrypted multi-node network. Over 2 million users connect to the Tor network daily. For a complete setup walkthrough, including Tails OS, Whonix, and VPN configurations, see our step-by-step darknet access guide.
Staying Safe on Tor
The dark web is volatile. Sites disappear overnight, URLs change without warning, and phishing clones proliferate. Our market shutdown timeline documents every major takedown since 2013. Essential precautions include:
- Never share personal information or use real-world identities
- Verify .onion links through multiple independent sources (Dread, Tenebris, Dark.fail)
- Use PGP encryption for all communications (anti-phishing guide)
- Run Tails OS or Qubes for hardware-level isolation
- Prefer Monero (XMR) over Bitcoin for transaction privacy
- Understand escrow mechanics before any marketplace interaction
Our OPSEC Fundamentals guide covers these practices in detail with real-world case studies of operational security failures. For additional safety resources, see our harm reduction hub.