TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3.
Rewritten from TorGhost with Python 3. TorghostNG was tested on:
What’s New?
update_commands
and others in torghostng.py
theme.py
install.py
-r
Before You Use?
Installing
TorghostNG currently supports:
To install TorghostNG, open your Terminal and enter these commands
git clone https://github.com/githacktools/TorghostNG
cd TorghostNG
sudo python3 install.py
sudo torghostng
But with Slackware, you use sudo python3 torghostng.py
to run TorghostNG :v
Help
OPTIONS:
-h, –help Show this help message and exit
-s, –start Start connecting to Tor
-x, –stop Stop connecting to Tor
-r, –renew Renew the current Tor circuit
-id COUNTRY ID Connect to Tor exit node of a specific country. Go to CountryCode.org to search country ID
-mac INTERFACE Randomly change MAC address. Use ‘ifconfig’ to show interface devices
-c, –checkip Check your current IPv4 address
–dns Use this to fix DNS when website address can’t be resolved
-l, –language Change the display language. English is the default
–list Show the available languages list
-u, –update Check for update
–nodelay Disable delay time
You can combine multiple choices at the same time, such as:
torghostng -s -m INTERFACE
: Changing MAC address before connectingtorghostng -c -m INTERFACE
: Checking IP address and changing MAC addresstorghostng -s -x
: Connecting to Tor anh then stop :vHow To Update?
Open Terminal and type torghostng -u
with sudo to update TorghostNG, but it will download new TorghostNG to /root
, because you’re running it as root. If you don’t like that, you can type git pull -f
and sudo python3 install.py
.
Also Read – Intercept : Policy As Code Static Analysis Auditing
Screenshots
torghostng -m INTERFACE
torghostng -c
torghostng -x
torghostng -id COUNTRY ID
python3 install.py
Credit: @SecureGF
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…