TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3.
Rewritten from TorGhost with Python 3. TorghostNG was tested on:
What’s New?
update_commands
and others in torghostng.py
theme.py
install.py
-r
Before You Use?
Installing
TorghostNG currently supports:
To install TorghostNG, open your Terminal and enter these commands
git clone https://github.com/githacktools/TorghostNG
cd TorghostNG
sudo python3 install.py
sudo torghostng
But with Slackware, you use sudo python3 torghostng.py
to run TorghostNG :v
Help
OPTIONS:
-h, –help Show this help message and exit
-s, –start Start connecting to Tor
-x, –stop Stop connecting to Tor
-r, –renew Renew the current Tor circuit
-id COUNTRY ID Connect to Tor exit node of a specific country. Go to CountryCode.org to search country ID
-mac INTERFACE Randomly change MAC address. Use ‘ifconfig’ to show interface devices
-c, –checkip Check your current IPv4 address
–dns Use this to fix DNS when website address can’t be resolved
-l, –language Change the display language. English is the default
–list Show the available languages list
-u, –update Check for update
–nodelay Disable delay time
You can combine multiple choices at the same time, such as:
torghostng -s -m INTERFACE
: Changing MAC address before connectingtorghostng -c -m INTERFACE
: Checking IP address and changing MAC addresstorghostng -s -x
: Connecting to Tor anh then stop :vHow To Update?
Open Terminal and type torghostng -u
with sudo to update TorghostNG, but it will download new TorghostNG to /root
, because you’re running it as root. If you don’t like that, you can type git pull -f
and sudo python3 install.py
.
Also Read – Intercept : Policy As Code Static Analysis Auditing
Screenshots
torghostng -m INTERFACE
torghostng -c
torghostng -x
torghostng -id COUNTRY ID
python3 install.py
Credit: @SecureGF
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…