TorghostNG will make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3.
Rewritten from TorGhost with Python 3. TorghostNG was tested on:
What’s New?
update_commands
and others in torghostng.py
theme.py
install.py
-r
Before You Use?
Installing
TorghostNG currently supports:
To install TorghostNG, open your Terminal and enter these commands
git clone https://github.com/githacktools/TorghostNG
cd TorghostNG
sudo python3 install.py
sudo torghostng
But with Slackware, you use sudo python3 torghostng.py
to run TorghostNG :v
Help
OPTIONS:
-h, –help Show this help message and exit
-s, –start Start connecting to Tor
-x, –stop Stop connecting to Tor
-r, –renew Renew the current Tor circuit
-id COUNTRY ID Connect to Tor exit node of a specific country. Go to CountryCode.org to search country ID
-mac INTERFACE Randomly change MAC address. Use ‘ifconfig’ to show interface devices
-c, –checkip Check your current IPv4 address
–dns Use this to fix DNS when website address can’t be resolved
-l, –language Change the display language. English is the default
–list Show the available languages list
-u, –update Check for update
–nodelay Disable delay time
You can combine multiple choices at the same time, such as:
torghostng -s -m INTERFACE
: Changing MAC address before connectingtorghostng -c -m INTERFACE
: Checking IP address and changing MAC addresstorghostng -s -x
: Connecting to Tor anh then stop :vHow To Update?
Open Terminal and type torghostng -u
with sudo to update TorghostNG, but it will download new TorghostNG to /root
, because you’re running it as root. If you don’t like that, you can type git pull -f
and sudo python3 install.py
.
Also Read – Intercept : Policy As Code Static Analysis Auditing
Screenshots
torghostng -m INTERFACE
torghostng -c
torghostng -x
torghostng -id COUNTRY ID
python3 install.py
Credit: @SecureGF
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…