Categories: Kali Linux

Nipe- Script To Make Tor Network Your Default Gateway

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables to course all activity over Tor. The issue is that Tor just backings TCP and not UDP. So the majority of your UDP applications like “dns queries” are going to fail. The script likewise has a difficult issue if the Linux framework is designed for IPv6. What’s more, Linux naturally underpins IPv6. On the off chance that your nearby system or ISP bolsters IPv6, at that point it’s empowered. Specifically, the script does not divert IPv6 TCP through Tor, so it is paltry for you to be uncovered that way.

Also Read SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

How  Nipe works ?

Tor enables users to surf the Internet, chat and send instant messages
anonymously, and is used by a wide variety of people for both Licit and
Illicit purposes. Tor has, for example, been used by criminals enterprises,
Hacktivism groups, and law enforcement agencies at cross purposes, sometimes
simultaneously.

Nipe is a Script to make Tor Network your Default Gateway.

This Perl Script enables you to directly route all your traffic from your
computer to the Tor Network through which you can surf the Internet Anonymously
without having to worry about being tracked or traced back.

Download and install:

git clone https://github.com/GouveaHeitor/nipe
cd nipe
cpan install Switch JSON LWP::UserAgent

Commands:

COMMAND          FUNCTION
install          Install dependencies
start            Start routing
stop             Stop routing
restart          Restart the Nipe process
status           See status

Examples:

perl nipe.pl install
perl nipe.pl start
perl nipe.pl stop
perl nipe.pl restart
perl nipe.pl status

[+] AUTOR: Heitor Gouvêa
[+] SITE: https://heitorgouvea.me
[+] EMAIL: hi@heitorgouvea.me
[+] GITHUB: https://github.com/GouveaHeitor
[+] TELEGRAM: @GouveaHeitor

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

18 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

18 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago