Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/moxie0/tortunnel
A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes
https://github.com/moxie0/tortunnel
Last synced: 3 months ago
JSON representation
A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes
- Host: GitHub
- URL: https://github.com/moxie0/tortunnel
- Owner: moxie0
- License: gpl-3.0
- Created: 2011-09-20T02:09:54.000Z (about 13 years ago)
- Default Branch: master
- Last Pushed: 2015-09-08T21:20:50.000Z (about 9 years ago)
- Last Synced: 2024-04-23T19:20:32.777Z (7 months ago)
- Language: C++
- Homepage: http://www.thoughtcrime.org/software/tortunnel/
- Size: 241 KB
- Stars: 141
- Watchers: 16
- Forks: 39
- Open Issues: 13
-
Metadata Files:
- Readme: README
- Changelog: ChangeLog
- License: COPYING
Awesome Lists containing this project
- awesome-network-stuff - **114**星 - hop circuits through Tor exit nodes (<a id="6e80463404d46f0493cf6e84597e4b5c"></a>工具 / <a id="e99ba5f3de02f68412b13ca718a0afb6"></a>Tor&&&Onion&&洋葱)
README
tortunnel is a partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes. This is useful in cases where you might want some very low level of anonymity and don't want to deal with the performance implications of using Tor's full three-hop circuits.
tortunnel exposes itself both as a SOCKS interface, as well as a fairly clean asynchronous C++ API to the Tor protocol itself. It was first written as a scanning tool for checking to see whether exit nodes were running sslstrip, and is well suited for implementing other high-performance scanning routines against the Tor network as a whole.
It might also be useful for implementing a perspectives-like interface for checking SSL, SSH, or other host certificates. It could be useful as an nmap scanning mode, or perhaps for something else entirely.
To expose a SOCKS interface on localhost:5060 to a random one-hop Tor exit node, run:
torproxy -p 5060 -r
To expose a SOCKS interface on localhost:5060 to a specific Tor exit node IP address, run:
torproxy -p 5060 -n
These commands will open a SOCKS interface on localhost:5060, which you can then point applications which support SOCKS proxies to. Be careful, though, remember that this is not useful for anything approaching strict anonymity requirements.
To see if it works, you can try a "curl --socks5 localhost:5060 ifconfig.me" and compare it with the output of "curl ifconfig.me".