torsocks
proxychains
Our great sponsors
torsocks | proxychains | |
---|---|---|
563 | 19 | |
498 | 6,033 | |
- | - | |
0.0 | 7.0 | |
about 2 years ago | 4 months ago | |
C | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
torsocks
-
A Beginner's Guide to Hosting a Dark Web Chat Interface
Start by downloading and installing the Tor browser from the official website (https://www.torproject.org/). This browser allows you to access the dark web and interact with onion services.
-
Browsers Are Weird
Don't these Tor Browser[0]: the Tor Project version of Firefox. It aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.
A Mullvad Browser[1]: a browser developed in collaboration between Mullvad VPN and the Tor Project, which is meant to be used with a VPN instead of the Tor network.
[0]: https://www.torproject.org/
- Use Tor Browser to browse web anonymously sends thru 3 relays layer of encryption removed each relay sites see exit relay IP Address if in country censors Tor use "bridges"
-
Best way to help?
See https://www.torproject.org/ (Tor website)
-
How to Access Starfiles and Bypass Censorship
How to setup I2P | How to setup Tor
- The Tor network offers free and private browsing as well as onion servers not listed on the public web
- Use Tor Browser legal in USA browse web anonymously sends thru 3 relays layer of encryption removed each relay sites see exit relay IP Address spread to as many people as possible.
- Use Tor Browser legal in Canada browse web anonymously sends thru 3 relays layer of encryption removed each relay sites see exit relay IP Address spread to as many people as possible.
- Use Tor Browser legal in Spain browse web anonymously sends thru 3 relays layer of encryption removed each relay sites see exit relay IP Address spread to as many people as possible.
- Use Tor Browser legal in Ireland browse web anonymously sends thru 3 relays layer of encryption removed each relay sites see exit relay IP Address spread to as many people as possible.
proxychains
-
Using LD_PRELOAD to cheat, inject features and investigate programs
Fun fact: proxychains uses LD_PRELOAD [0] to hook the necessary syscalls [1] for setting up a "proxy environment" for the wrapped program, e.g. `connect`, `gethostbyname`, `gethostbyaddr`, etc. Note this also implies that it could be leaky in some cases when applied to a program that uses alternative syscalls to make an external connection.
[0] https://github.com/haad/proxychains/blob/master/src/proxycha...
[1] https://github.com/haad/proxychains/blob/master/src/libproxy...
- IRC question
- Issue with proxychains and SSH tunneling
-
Help with bypassing hospital VPN and wireguard block
You can use ProxyChains in order to use the SOCKS5 proxy with any application, depending on the OS you are using.
-
/etc/proxychains.conf is empty
I assume that https://github.com/haad/proxychains is the project in question. At https://github.com/haad/proxychains/blob/master/src/proxychains.conf you can view the contents of the configuration file and then save it in /etc/proxychains.conf.
-
Proxychains.conf empty???
That is weird. However, missing configs are usually an easy problem to solve - simply find one online and copy it (once you understand it). Here is the one from the proxy chains repo. Lastly, be careful with Kali, it's definitely not suited to beginners (you're doing the right thing running it in a VM at least).
-
TOOL: ntlmrelayx2proxychains
ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, ntlmrelayx.py (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
- Digital War Against Putin -- Automated Google Reviews with Python
-
Setting network proxy on linux desktop
You can go even further with tools like proxychains that let you chain multiple proxies. This is used while setting up tor and comes pre-installed with pentesting distros like Kali and ParrotOS.
- ProxyChains
What are some alternatives?
duckduckgo-locales - Translation files for <a href="https://duckduckgo.com"> </a>
CrackMapExec - A swiss army knife for pentesting networks
docker-tor - A docker image for deploying tor with Docker and/or Kubernetes
Tor - Tor protects your privacy on the Internet by hiding the connection between your Internet address and the services you use. (This is *not* the official repository.)
tribler - Privacy enhanced BitTorrent client with P2P content discovery
nipe - An engine to make Tor network your default gateway
sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
linux-cli-community - Linux command-line client for ProtonVPN. Written in Python.
impacket - Impacket is a collection of Python classes for working with network protocols.
loki-network - Lokinet is an anonymous, decentralized and IP based overlay network for the internet.
ansible-squid - Ansible Squid role