Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network.
Generate the skeleton configuration for you hidden service, replace for your hidden service pattern name. Example, if you want to your hidden service contain the word ‘boss’, just use this word as argument. You can use regular expressions, like ^boss, will generate an address wich will start with ‘boss’. Be aware that bigger the pattern, more time it will take to generate it.
docker run -it --rm -v $(pwd)/web:/web \
strm/tor-hiddenservice-nginx generate <pattern> Create an container named ‘hiddensite’ to serve your generated hidden service
docker run -d --restart=always --name hiddensite -v $(pwd)/web:/web \
strm/tor-hiddenservice-nginx Also ReadAtlas – Quick SQLMap Tamper Suggester
Let’s create a hidden service with the name beginning with strm.
docker pull strm/tor-hiddenservice-nginx Wait to the container image be downloaded. And them we can generate our site skeleton:
$docker run -it --rm -v $(pwd)/web:/web strm/tor-hiddenservice-nginx generate ^strm
[+] Generating the address with mask: ^strm
[+] Found matching domain after 137072 tries: strmfyygjp5st54g.onion
[+] Generating nginx configuration for site strmfyygjp5st54g.onion
[+] Creating www folder
[+] Generating index.html template Now we have our skeleton generated, we can run the container with:
docker run -d --restart=always --name hiddensite \
-v $(pwd)/web:/web strm/tor-hiddenservice-nginx And you have the service running ! 🙂
docker build -t strm/tor-hiddenservice-nginx .
docker run -d --restart=always --name hiddensite -v $(pwd)/web:/web strm/tor-hiddenservice-nginx
docker run -it --rm -v $(pwd)/web:/web --entrypoint /bin/bash strm/tor-hiddenservice-nginx
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…