Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only that you need is: a system using systemd (if you want to use the service) and tor.
It doesn’t touch system files as the rest of tools for routing your traffic does and the reason is: there isn’t needed to move files for routing traffic, also moving files is a bad idea since that a fail in the script/tool can break your system connection without you knowing what has happened.
Script To Install On Distros Using SystemD Only
If you are using BlackArch Linux (https://blackarch.org) you can install the script from the repos using the following command: # pacman -S tor-router
To install from source:
Note that you need BASH, not sh
~$ git clone https://gitlab.com/edu4rdshl/tor-router.git && cd ./tor-router && sudo bash install.sh
Also Read – IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor
In distros using systemd, you should consideer using the install.sh script, anyways the process to install/configure tor-router is described here.
It script require root privileges
~$ git clone https://gitlab.com/edu4rdshl/tor-router.git && cd tor-router/files
# Seting up TOR transparent proxy for tor-router
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 5353
# sudo ./tor-router
Delete the tor-router configuration lines in /etc/tor/torrc, disable the tor-router.service using systemctl (if you used the install.sh script), remove /usr/bin/tor-router, /etc/systemd/system/tor-router.service and restart your computer.
After of run the script, follow the next steps to ensure that all is working as expected:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…