viernes, 28 de agosto de 2020

TorghostNG: Make All Your Internet Traffic Anonymized With Tor Network

About TorghostNG
   TorghostNG is a tool that make all your internet traffic anonymized with Tor network. TorghostNG is rewritten from TorGhost with Python 3.

   TorghostNG was tested on:
  • Kali Linux 2020a
  • Manjaro
  • ...

What's new in TorghostNG 1.2

Before you use TorghostNG
  • For the goodness of Tor network, BitTorrent traffic will be blocked by iptables. Although you can bypass it with some tweaks with your torrent client 😥 It's difficult to completely block all torrent traffic.
  • For security reason, TorghostNG is gonna disable IPv6 to prevent IPv6 leaks (it happened to me lmao).

Screenshots of Torghost (Version 1.0)
   Connecting to Tor exitnode in a specific country: torghostng -id COUNTRY ID

   Changing MAC address: torghostng -m INTERFACE

   Checking IP address: torghostng -c

   Disconnecting from Tor: torghostng -x

   Uninstalling TorghostNG: python3 install.py

Installing TorghostNG
   TorghostNG installer currently supports:
  • GNU/Linux distros that based on Arch Linux
  • GNU/Linux distros that based on Debian/Ubuntu
  • GNU/Linux distros that based on Fedora, CentOS, RHEL, openSUSE
  • Solus OS
  • Void Linux
  • Anh the elder guy: Slackware
  • (Too much package managers for one day :v)

   To install TorghostNG, open your Terminal and enter these commands:
   But with Slackware, you use sudo python3 torghostng.py to run TorghostNG :v

Help
    You can combine multiple choices at the same time, such as:
  • torghostng -s -m INTERFACE: Changing MAC address before connecting
  • torghostng -c -m INTERFACE: Checking IP address and changing MAC address
  • torghostng -s -x: Connecting to Tor anh then stop :v
  • ...
   If you have any questions, you can watch this tutorial videos 🙂
   I hope you will love it 😃

How to update TorghostNG
   Open Terminal and type sudo torghostng -u with sudo to update TorghostNG, but it will download new TorghostNG to /root, because you're running it as root. If you don't like that, you can type git pull -f and sudo python3 install.py.

Notes before you use Tor
   Tor can't help you completely anonymous, just almost:
   It's recommended that you should use NoScript before before surfing the web with Tor. NoScript shall block JavaScript/Java/Flash scripts on websites to make sure they won't reveal your real identify.

And please
  • Don't spam or perform DoS attacks with Tor. It's not effective, you will only make Tor get hated and waste Tor's money.
  • Don't torrent over Tor. If you want to keep anonymous while torrenting, use a no-logs VPN please.
   Bittorrent over Tor isn't a good idea
   Not anonymous: attack reveals BitTorrent users on Tor network

Changes log
   Version 1.2
  • Fixed update_commands and others in torghostng.py
  • Changed a few things in theme.py
  • Changed a few things in install.py
  • Now you can change Tor circuit with -r
   Version 1.1
  • Check your IPv6
  • Change all "TOR" to "Tor"
  • Block BitTorrent traffic
  • Auto disable IPv6 before connecting to Tor

Contact to the coder

To-do lists:
  • Block torrent, for you - Tor network (Done 😃)
  • Connect to IPv6 relays (maybe?)
  • GUI version
  • Fix bug, improve TorghostNG (always)

And finally: You can help me by telling me if you find any bugs or issues. Thank you for using my tool 😊

Read more


Networking | Routing And Switching | Tutorial 4 | 2018


Welcome to my 4th new tutorial of the series of networking. In this blog you'll the content about network switches. You'll learn about how to make a communication successful and secure in the same network (LAN) by using STP. As Spanning tree protocol (STP) we used in multi-switched networks. Why we use this protocol in multi-switched network etc.

What is Switch? 

A switch is an intelligent device used to connect multiple devices within the same network. The intelligence of is that it requires Media Access Control (MAC) address for communication and doesn't allow broadcast.  Let's understand the whole thing by a little example, consider there is a network having 3 end devices name Device-A, Device-B,Device-C connected with each other respectively with the help of switch. When a Device-A sends data to Device-C so that data will only forwarded by switch to Device-C not to Device-B.

What is Media Access Control (MAC) address?

A Media Access Control (MAC) address is 48-bit unique physical address given to network interface controller (NIC) or network adapter, for communication within the same network which is given by its manufacturer. It is made up of hexadecimal numbers like a1:b1:cc:ac:2e:f1.

What is STP?


STP stands for Spanning tree protocol which is basically used in bridge and switches to prevent loops when you have a redundant links in the Ethernet networks. If the loop is present in the Ethernet network so the whole network will suffer because there will MAC instability in the MAC table,  duplicate frames generation and so on. Let's move to the video for further detail.



Spaghetti's Features:
   Fingerprints:
  • Server:
  • Web Frameworks (CakePHP,CherryPy,...)
  • Web Application Firewall (Waf)
  • Content Management System (CMS)
  • Operating System (Linux,Unix,..)
  • Language (PHP,Ruby,...)
  • Cookie Security
   Discovery:
  • Bruteforce:Admin Interface
    Common Backdoors
    Common Backup Directory
    Common Backup File
    Common Directory
    Common FileLog File
  • Disclosure: Emails, Private IP, Credit Cards
   Attacks:
  • HTML Injection
  • SQL Injection
  • LDAP Injection
  • XPath Injection
  • Cross Site Scripting (XSS)
  • Remote File Inclusion (RFI)
  • PHP Code Injection
   Other:
  • HTTP Allow Methods
  • HTML Object
  • Multiple Index
  • Robots Paths
  • Web Dav
  • Cross Site Tracing (XST)
  • PHPINFO
  • .Listing
   Vulns:
  • ShellShock
  • Anonymous Cipher (CVE-2007-1858)
  • Crime (SPDY) (CVE-2012-4929)
  • Struts-Shock
Spaghetti Example:
python spaghetti --url example.com --scan 0 --random-agent --verbose


More information


  1. Tools 4 Hack
  2. Growth Hacker Tools
  3. Hacking Tools Online
  4. Pentest Tools Github
  5. Hacker Hardware Tools
  6. Termux Hacking Tools 2019
  7. Pentest Tools Nmap
  8. Hack Tools 2019
  9. Wifi Hacker Tools For Windows
  10. Pentest Tools Windows
  11. Pentest Tools Android
  12. Hack Tool Apk
  13. Hacking Tools For Kali Linux
  14. Hacker Search Tools
  15. Game Hacking
  16. Hacker Tools Github
  17. Hacking Tools
  18. Hacker Tools Online
  19. Hack Apps
  20. Hacking Tools Windows 10
  21. Hacking Tools And Software
  22. Wifi Hacker Tools For Windows
  23. Pentest Tools Tcp Port Scanner
  24. Termux Hacking Tools 2019
  25. Hack Tools For Mac
  26. Pentest Reporting Tools
  27. Pentest Tools For Mac
  28. Android Hack Tools Github
  29. Hackers Toolbox
  30. Hack Tools For Windows
  31. Hack Tools For Ubuntu
  32. Hacking Apps
  33. Hacker Tool Kit
  34. Hacker Search Tools
  35. Pentest Tools List
  36. What Is Hacking Tools
  37. Hacking Tools Online
  38. Hack Rom Tools
  39. Hacking Tools Online
  40. Best Pentesting Tools 2018
  41. Hacker Tools Mac
  42. Hacks And Tools
  43. Pentest Tools List
  44. Pentest Tools Subdomain
  45. Hacker Hardware Tools
  46. Best Hacking Tools 2020
  47. Pentest Tools
  48. Computer Hacker
  49. Pentest Tools Alternative
  50. Hacker Tools Windows
  51. Best Pentesting Tools 2018
  52. Hacker Tools For Mac
  53. Hacking Tools Hardware
  54. Pentest Tools Tcp Port Scanner
  55. Hack Tools For Mac
  56. How To Install Pentest Tools In Ubuntu
  57. Pentest Tools Subdomain
  58. Blackhat Hacker Tools
  59. Pentest Tools Nmap
  60. Hacking Tools Name
  61. Hacker Security Tools
  62. Hacker Hardware Tools
  63. Hacker Tool Kit
  64. World No 1 Hacker Software
  65. How To Install Pentest Tools In Ubuntu
  66. Hacks And Tools
  67. Pentest Tools Alternative
  68. Pentest Tools For Ubuntu
  69. Nsa Hack Tools Download
  70. Usb Pentest Tools
  71. Pentest Tools Alternative
  72. Tools 4 Hack
  73. Pentest Tools Port Scanner
  74. Hacker Security Tools
  75. Pentest Recon Tools
  76. Hacking Tools Windows
  77. Hacker Security Tools
  78. Hacker Tools 2020
  79. Black Hat Hacker Tools
  80. Hacker Tools Software
  81. Hack Apps
  82. Pentest Tools For Android
  83. Pentest Tools Free
  84. Hack Tools For Games
  85. Tools Used For Hacking
  86. Pentest Tools Free
  87. Hack Rom Tools
  88. Best Pentesting Tools 2018
  89. Hacker
  90. Pentest Tools Free
  91. Black Hat Hacker Tools
  92. Hacking Tools Free Download
  93. What Is Hacking Tools
  94. Best Hacking Tools 2019
  95. Hacker Tools For Mac
  96. Hack Tools For Pc
  97. Bluetooth Hacking Tools Kali
  98. World No 1 Hacker Software
  99. Hacking Tools Mac
  100. Hack Tools For Mac
  101. Hacking Tools For Kali Linux
  102. Hacking Tools Usb
  103. Android Hack Tools Github
  104. Hack Tools
  105. Hacking Tools For Windows Free Download
  106. Hacking Tools For Windows Free Download
  107. Top Pentest Tools
  108. Pentest Tools For Windows
  109. Hacking Tools For Pc
  110. Hacking Tools For Kali Linux
  111. Install Pentest Tools Ubuntu
  112. Hack Tools 2019
  113. Hacking Tools Pc
  114. Hacker Tools For Ios
  115. Hacker Tools 2020
  116. Hacking Tools Windows
  117. Hacking Tools Pc
  118. Growth Hacker Tools
  119. Pentest Tools For Ubuntu
  120. Hacker Tools Hardware
  121. Best Hacking Tools 2020
  122. Pentest Tools For Mac
  123. Termux Hacking Tools 2019
  124. Pentest Tools Url Fuzzer
  125. Install Pentest Tools Ubuntu
  126. Hacker Tools Hardware
  127. Hacks And Tools
  128. Hack Tools Pc
  129. Hacker Tools 2020
  130. Game Hacking
  131. Hacking Tools For Windows 7
  132. Hack Tools For Windows
  133. Pentest Tools Download
  134. Hacking Tools For Windows Free Download
  135. Pentest Tools Alternative
  136. Hack Tools Online
  137. Termux Hacking Tools 2019
  138. Pentest Tools Alternative
  139. Nsa Hacker Tools
  140. Hacking Tools 2020
  141. Wifi Hacker Tools For Windows
  142. Hacking Tools For Mac
  143. How To Make Hacking Tools
  144. Hacker Tools For Pc