Tor
proxychains
Our great sponsors
Tor | proxychains | |
---|---|---|
121 | 19 | |
15 | 5,974 | |
- | - | |
0.0 | 7.0 | |
about 12 years ago | 3 months ago | |
C | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Tor
- No More Google
-
Does Private Relay hide what websites i visit from my ISP?
The only difference Private Relay makes to this sequence is that it hides your IP from the website you're visiting in the networking phase by acting as a proxy. This is similar to what TOR does by routing your network traffic through multiple nodes before letting it reach its final destination. This process does not hide which websites you visit from your ISP itself IF they also act as your DNS provider, which is almost universally true.
-
Hello r/FindMeADistro ,
I use the Tor Browser & launcher direct from the torproject out of preference but the torbrowser launcher is available in the repos.
-
Has any of you keep getting the Mormon ads on YouTube ?
Since seeing certain ads and being tracked seems to be a concern for you, I'd highly recommend using the Brave browser and DuckDuckGo search engine -- this will give you an excellent starting-place at protecting your privacy online and blocking ads. If you want to go much further in ensuring privacy, the Tor browser will keep you almost entirely anonymous
- Intéressante la nouvelle update de Windows
- No More Google 🙅
-
Brave is not private.
Another thing, the Tor tabs in Brave are not private: The HTTP header leaks your time zone. People, use Tor Browser when you need privacy https://www.torproject.org/ Do not attempt to configure your own private browser (especially, do not modify Tor Browser): you'll probably just end up creating a unique looking browser that can can be always linked back to you.
-
FBI built fake phone company in global wiretapping operation of historic proportions
The best practice for private browsing is the Tor Browser https://www.torproject.org/
-
Perchance Aether channel?
Aether is a (FOSS) Reddit alternative. It is based on privacy and decentralization, but even if you disagree with those ideals (or simply don't care) you must note that it is a quickly-growing platform with quite a few users already. It seems to have good support, and won't be going away anytime soon. However, since each Aether user is more or less also a server (think Tor), your bandwidth can suffer if you leave it running like it asks.
-
Why am I still getting this page even after enabling 1.1.1.1 DNS?
You should try Tor. It's Firefox with the Tor Network for anti-censorship.
proxychains
-
Using LD_PRELOAD to cheat, inject features and investigate programs
Fun fact: proxychains uses LD_PRELOAD [0] to hook the necessary syscalls [1] for setting up a "proxy environment" for the wrapped program, e.g. `connect`, `gethostbyname`, `gethostbyaddr`, etc. Note this also implies that it could be leaky in some cases when applied to a program that uses alternative syscalls to make an external connection.
[0] https://github.com/haad/proxychains/blob/master/src/proxycha...
[1] https://github.com/haad/proxychains/blob/master/src/libproxy...
-
Help with bypassing hospital VPN and wireguard block
You can use ProxyChains in order to use the SOCKS5 proxy with any application, depending on the OS you are using.
-
TOOL: ntlmrelayx2proxychains
ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, ntlmrelayx.py (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
- Digital War Against Putin -- Automated Google Reviews with Python
-
Setting network proxy on linux desktop
You can go even further with tools like proxychains that let you chain multiple proxies. This is used while setting up tor and comes pre-installed with pentesting distros like Kali and ParrotOS.
-
Tunneling all your internet connections through a socks proxy
Not so many years ago when I used to live in Cuba, the only access to the internet I could use was using a Proxy set by the institution I was working for or the college I studied at. The managers on these networks used to restrict the contents you could access as hard as possible so at work you could not check Facebook or other social media, but that was not the main problem. Since Cuba is embargoed by the United States of America, several important resources like Docker images, Gitlab, and Google resources for coding in Android were all blocked for any Cuban IP. Conclusion: you need to use a VPN if you want anything done. Not being able to pay for a VPS (no such thing as credit cards in Cuba) I was heavily using Tor, YourFreedom, or even an SSH tunnel if someone borrowed me their access to a VPS, and many other alternatives to circumvent censorship. Most of the time, these connections ended up in being a socks proxy either on my computer or my local trusted network, and I could use them easily from my browser or on several applications using tsocks or proxychains. But the holy grail of this problem was to get all the traffic from your computer to be tunneled only using a socks proxy, and that I could not achieve. Until now :-)
-
How do I route all of my traffic through tor
There are programs like proxychains, they allow you to proxy traffic of individual applications, but a more reliable option would be to use Whonix.
-
Introducing Tor
ProxyChains (https://github.com/haad/proxychains) is a tool with the ability to connect to various proxies through the HTTP(S), SOCKS4, and SOCKS5 protocols. It also has the ability to resolve DNS addresses through the proxy server. By using this application with Tor, it becomes very difficult for others to detect our real IP.
- Best solution for deploying multiple proxy chains on different ports as separate proxies?
What are some alternatives?
torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git
CrackMapExec - A swiss army knife for pentesting networks
nipe - An engine to make Tor network your default gateway
nitter - Alternative Twitter front-end
sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
impacket - Impacket is a collection of Python classes for working with network protocols.
Invidious - Invidious is an alternative front-end to YouTube
ansible-squid - Ansible Squid role
duckduckgo-locales - Translation files for <a href="https://duckduckgo.com"> </a>
badvpn - NCD scripting language, tun2socks proxifier, P2P VPN
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.