torghost v2.0

TorGhost v2.0 Released!! – With instant IP switching

Torghost v1 is just a tool to route all connection through tor network. You can find more about basic working here TorGhost – channel all traffic through tor network in kali linux Whats new with torghost 2.0 Torghost comes with an update where you can change tor’s exit node instantly. It can interact with tor’s control […]

torghost

TorGhost – channel all traffic through tor network in kali linux

Tor is one of the best freely available network to protect your identity. Its considered safe because of its highly cryptographic data transfer methods. I’m not going to explain working of tor in detail, if you are interested pls read my previous blog on How to change tor exit node manually. You can switch between exit […]

what is dns leak

What is DNS leak and how it affects your anonymity

WHAT IS DNS DNS or Domain Name System is like internet phonebook. Humans identify things people places by names whereas computers only know numbers. Each and every URL you type for example www.example.com, you are first directed to the DNS server which searches for the correct Ip address of the url or domain name that […]

Dos attack through tor network – safe and effective ddos tool 2016

Denial of service attacks is still effective and powerful attack against a web server.Even though we have plenty of tools available, most of them are not safe and can track any attacker but, “Torshammer” an awesome piece of python script can solve that problem. This script use the tor anonymity service to mask the user […]

5-tips-to-stay-anonymous-online

5 Tips to stay anonymous online

Online anonymity is vital for a hacker or a person who want privacy. If you are concerned about your privacy and security you must read this. Staying anonymous online means hiding your IP address, location or simply hiding all sort of IDs. Any government organisations can easily fingerprint a normal user by simply tracing the IP […]

change-tor-exit-node-mannually

How to change tor exit node manually

 When it comes to penetration testing the first preference is online anonymity. Hackers use services such as VPN or TOR, comparatively tor offers more security and anonymity on the web and in addition it allow access to the dark web. I personally prefer tor over vpn. Tor is configured in such a way that  a combination of three relays or nodes. […]