Skip to content

Instantly share code, notes, and snippets.

@faisalfs10x
Last active March 19, 2023 04:58
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save faisalfs10x/a976c98b678a7f934f7c9b895fbb80c9 to your computer and use it in GitHub Desktop.
Save faisalfs10x/a976c98b678a7f934f7c9b895fbb80c9 to your computer and use it in GitHub Desktop.
sudo apt-get install -y proxychains4 tor
# update /etc/proxychains-tor.conf and /etc/tor/torrc with the given config
# restart tor service
sudo systemctl restart tor.service
# test the connection with proxychains + tor
while true; do proxychains -q -f /etc/proxychains-tor.conf curl ifconfig.me \n; done
# test dnsleak
proxychains -q -f /etc/proxychains-tor.conf firefox dnsleaktest.com
# proxychains.conf VER 4.x
#
# HTTP, SOCKS4, SOCKS5 tunneling proxifier with DNS.
#
# The option below identifies how the ProxyList is treated.
# only one option should be uncommented at time,
# otherwise the last appearing option will be accepted
#
dynamic_chain
#
# Dynamic - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# at least one proxy must be online to play in chain
# (dead proxies are skipped)
# otherwise EINTR is returned to the app
#
#strict_chain
#
# Strict - Each connection will be done via chained proxies
# all proxies chained in the order as they appear in the list
# all proxies must be online to play in chain
# otherwise EINTR is returned to the app
#
#random_chain
#
# Random - Each connection will be done via random proxy
# (or proxy chain, see chain_len) from the list.
# this option is good to test your IDS :)
# Make sense only if random_chain
#chain_len = 2
# Quiet mode (no output from library)
quiet_mode
# Proxy DNS requests - no leak for DNS data
proxy_dns
# Some timeouts in milliseconds
tcp_read_time_out 15000
tcp_connect_time_out 8000
# ProxyList format
# type host port [user pass]
# (values separated by 'tab' or 'blank')
#
#
# Examples:
#
# socks5 192.168.67.78 1080 lamer secret
# http 192.168.89.3 8080 justu hidden
# socks4 192.168.1.49 1080
# http 192.168.39.93 8080
#
#
# proxy types: http, socks4, socks5
# ( auth types supported: "basic"-http "user/pass"-socks )
#
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks5 127.0.0.1 9050
ControlPort 9051
CookieAuthentication 1
MaxCircuitDirtiness 1
CircuitBuildTimeout 10
LearnCircuitBuildTimeout 0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment