InviZible and its Tor module can be used for VPN over Tor.
In this case, Internet traffic first passes through the Tor network and then through the VPN to its destination.
This requires any VPN that can bypass apps. In fact, most VPNs have this feature.
I am using ShadowSocks VPN for example.
Disable Route all traffic through Tor and select ShadowSocks to route its traffic to Tor
Or you can use Tor socks5 (9050) or http (8118) proxy if VPN can use proxy. In this case, you do not need to select ShadowSocks to route its traffic through Tor.
You need to configure each server that you will use for VPN over Tor.
If you have started DNSCrypt, all applications will be protected by DNSCrypt. If you have started Purple I2P, all applications can access I2P sites. All other apps are using VPN over Tor.
In the screenshot below, you can see that browserleaks.com is passing through the VPN over Tor and is still using DNSCrypt DNS.
- The sites you visit will never know that you are using Tor, so you will not see the annoying ReCaptcha or that you have a suspicious IP address and the site is blocking it.
- Internet traffic that passes through Tor is encrypted with a VPN. No one Tor server knows which sites you are visiting.
- You can additionally use Tor bridges with VPN over Tor to improve your privacy and anonymity.
- The VPN service can see your unencrypted traffic, so the VPN needs to be truly trustworthy. Otherwise, you will lose the privacy and anonymity that Tor provides. Also, untrusted VPNs can perform MITM attacks.
- The Tor exit node is constantly connected to the same VPN server. This will make it easier to de-anonymize you.
You can read what the Tor developers think of VPN over Tor You -> Tor -> VPN/SSH