TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3.
Rewritten from TorGhost with Python 3. TorghostNG was tested on:
What’s New?
update_commands and others in torghostng.pytheme.pyinstall.py-rBefore You Use?
Installing
TorghostNG currently supports:
To install TorghostNG, open your Terminal and enter these commands
git clone https://github.com/githacktools/TorghostNG
cd TorghostNG
sudo python3 install.py
sudo torghostng
But with Slackware, you use sudo python3 torghostng.py to run TorghostNG :v
Help
OPTIONS:
-h, –help Show this help message and exit
-s, –start Start connecting to Tor
-x, –stop Stop connecting to Tor
-r, –renew Renew the current Tor circuit
-id COUNTRY ID Connect to Tor exit node of a specific country. Go to CountryCode.org to search country ID
-mac INTERFACE Randomly change MAC address. Use ‘ifconfig’ to show interface devices
-c, –checkip Check your current IPv4 address
–dns Use this to fix DNS when website address can’t be resolved
-l, –language Change the display language. English is the default
–list Show the available languages list
-u, –update Check for update
–nodelay Disable delay time
You can combine multiple choices at the same time, such as:
torghostng -s -m INTERFACE: Changing MAC address before connectingtorghostng -c -m INTERFACE: Checking IP address and changing MAC addresstorghostng -s -x: Connecting to Tor anh then stop :vHow To Update?
Open Terminal and type torghostng -u with sudo to update TorghostNG, but it will download new TorghostNG to /root, because you’re running it as root. If you don’t like that, you can type git pull -f and sudo python3 install.py.
Also Read – Intercept : Policy As Code Static Analysis Auditing
Screenshots
torghostng -m INTERFACEtorghostng -ctorghostng -xtorghostng -id COUNTRY IDpython3 install.pyCredit: @SecureGF
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…