Tor
proxychains
Our great sponsors
Tor | proxychains | |
---|---|---|
121 | 19 | |
15 | 6,033 | |
- | - | |
0.0 | 7.0 | |
about 12 years ago | 4 months ago | |
C | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Tor
- No More Google
-
Browser and Website Issue
You could try downloading TOR (www.torproject.org) but some people prefer not to use it because some people think that the TOR people are (bad? cheaters?) 'not good'.
-
Does Private Relay hide what websites i visit from my ISP?
The only difference Private Relay makes to this sequence is that it hides your IP from the website you're visiting in the networking phase by acting as a proxy. This is similar to what TOR does by routing your network traffic through multiple nodes before letting it reach its final destination. This process does not hide which websites you visit from your ISP itself IF they also act as your DNS provider, which is almost universally true.
-
How can the Safemoon card be decentralised and be private?
One of the solutions I've seen mentioned is effectively the TOR network on the blockchain. While this type of solution would not guarantee anonymity it would at least make it more difficult for people to "follow the money" through the network just as the TOR browser makes it difficult for the FBI to follow your web traffic.
-
Cybersecurity analysts of Reddit, what are some things/actions/habits that people think keep them safe, but actually leave them vulnerable?
The TOR browser (https://www.torproject.org/) will encrypt your request and send it trough three separate servers before it ends up at the destination. It's what whistleblowers use to send info to journalists.
-
Just wondering…
If you need that level of online anonymity you should use a dedicated tool with a solid track record (https://www.torproject.org/, or https://geti2p.net/en/) -- both are free to use by the way.
-
Hello r/FindMeADistro ,
I use the Tor Browser & launcher direct from the torproject out of preference but the torbrowser launcher is available in the repos.
-
What is the "dark web" and how do you find it?
Tor (probably what you're looking for)
-
How?
To access onion sites, follow the documentation in the Tor Project. That will tell you everything you should know and it is relatively simple to set up.
-
Introducing Monero Punks Collective - a new workgroup dedicated to technical discussions and collaboration of tools and services
Please consider to host the infrastructure on Tor onion services.
proxychains
-
Using LD_PRELOAD to cheat, inject features and investigate programs
Fun fact: proxychains uses LD_PRELOAD [0] to hook the necessary syscalls [1] for setting up a "proxy environment" for the wrapped program, e.g. `connect`, `gethostbyname`, `gethostbyaddr`, etc. Note this also implies that it could be leaky in some cases when applied to a program that uses alternative syscalls to make an external connection.
[0] https://github.com/haad/proxychains/blob/master/src/proxycha...
[1] https://github.com/haad/proxychains/blob/master/src/libproxy...
- IRC question
- Issue with proxychains and SSH tunneling
-
Help with bypassing hospital VPN and wireguard block
You can use ProxyChains in order to use the SOCKS5 proxy with any application, depending on the OS you are using.
-
/etc/proxychains.conf is empty
I assume that https://github.com/haad/proxychains is the project in question. At https://github.com/haad/proxychains/blob/master/src/proxychains.conf you can view the contents of the configuration file and then save it in /etc/proxychains.conf.
-
Proxychains.conf empty???
That is weird. However, missing configs are usually an easy problem to solve - simply find one online and copy it (once you understand it). Here is the one from the proxy chains repo. Lastly, be careful with Kali, it's definitely not suited to beginners (you're doing the right thing running it in a VM at least).
-
TOOL: ntlmrelayx2proxychains
ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, ntlmrelayx.py (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
- Digital War Against Putin -- Automated Google Reviews with Python
-
Setting network proxy on linux desktop
You can go even further with tools like proxychains that let you chain multiple proxies. This is used while setting up tor and comes pre-installed with pentesting distros like Kali and ParrotOS.
- ProxyChains
What are some alternatives?
nitter - Alternative Twitter front-end
torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git
Invidious - Invidious is an alternative front-end to YouTube
CrackMapExec - A swiss army knife for pentesting networks
duckduckgo-locales - Translation files for <a href="https://duckduckgo.com"> </a>
nipe - An engine to make Tor network your default gateway
blahdns - A small hobby ads block dns project with doh, dot, dnscrypt support.
sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
Tutanota makes encryption easy - Tuta is an email service with a strong focus on security and privacy that lets you encrypt emails, contacts and calendar entries on all your devices.
impacket - Impacket is a collection of Python classes for working with network protocols.
Fido - A PowerShell script to download Windows or UEFI Shell ISOs
ansible-squid - Ansible Squid role