Last active
March 19, 2023 04:58
-
-
Save faisalfs10x/a976c98b678a7f934f7c9b895fbb80c9 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sudo apt-get install -y proxychains4 tor | |
# update /etc/proxychains-tor.conf and /etc/tor/torrc with the given config | |
# restart tor service | |
sudo systemctl restart tor.service | |
# test the connection with proxychains + tor | |
while true; do proxychains -q -f /etc/proxychains-tor.conf curl ifconfig.me \n; done | |
# test dnsleak | |
proxychains -q -f /etc/proxychains-tor.conf firefox dnsleaktest.com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# proxychains.conf VER 4.x | |
# | |
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS. | |
# | |
# The option below identifies how the ProxyList is treated. | |
# only one option should be uncommented at time, | |
# otherwise the last appearing option will be accepted | |
# | |
dynamic_chain | |
# | |
# Dynamic - Each connection will be done via chained proxies | |
# all proxies chained in the order as they appear in the list | |
# at least one proxy must be online to play in chain | |
# (dead proxies are skipped) | |
# otherwise EINTR is returned to the app | |
# | |
#strict_chain | |
# | |
# Strict - Each connection will be done via chained proxies | |
# all proxies chained in the order as they appear in the list | |
# all proxies must be online to play in chain | |
# otherwise EINTR is returned to the app | |
# | |
#random_chain | |
# | |
# Random - Each connection will be done via random proxy | |
# (or proxy chain, see chain_len) from the list. | |
# this option is good to test your IDS :) | |
# Make sense only if random_chain | |
#chain_len = 2 | |
# Quiet mode (no output from library) | |
quiet_mode | |
# Proxy DNS requests - no leak for DNS data | |
proxy_dns | |
# Some timeouts in milliseconds | |
tcp_read_time_out 15000 | |
tcp_connect_time_out 8000 | |
# ProxyList format | |
# type host port [user pass] | |
# (values separated by 'tab' or 'blank') | |
# | |
# | |
# Examples: | |
# | |
# socks5 192.168.67.78 1080 lamer secret | |
# http 192.168.89.3 8080 justu hidden | |
# socks4 192.168.1.49 1080 | |
# http 192.168.39.93 8080 | |
# | |
# | |
# proxy types: http, socks4, socks5 | |
# ( auth types supported: "basic"-http "user/pass"-socks ) | |
# | |
[ProxyList] | |
# add proxy here ... | |
# meanwile | |
# defaults set to "tor" | |
socks5 127.0.0.1 9050 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ControlPort 9051 | |
CookieAuthentication 1 | |
MaxCircuitDirtiness 1 | |
CircuitBuildTimeout 10 | |
LearnCircuitBuildTimeout 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment