TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR

TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only that you need is: a system using systemd (if you want to use the service) and tor.

TOR router doesn't touch system files as the rest of tools for routing your taffic does and the reason is: there isn't needed to move files for routing traffic, also moving files is a bad idea since that a fail in the script/tool can break your system connection without you knowing what has happened.

Script to install on distros using SystemD only

If you are using BlackArch Linux ( you can install the script from the repos using the following command: # pacman -S tor-router

To install from source:

Note that you need BASH, not sh

~$ git clone && cd ./tor-router && sudo bash


In distros using systemd, you should consideer using the script, anyways the process to install/configure tor-router is described here.

It script require root privileges

1. Open a terminal and clone the script using the following command: ~$ git clone && cd tor-router/files

2. Put the following lines at the end of /etc/tor/torrc # Seting up TOR transparent proxy for tor-router VirtualAddrNetwork AutomapHostsOnResolve 1 TransPort 9040 DNSPort 5353

3. Restart the tor service 4. Execute the tor-router script as root # sudo ./tor-router

5. Now all your traffic is under TOR, you can check that in the following pages: and for DNS tests:

6. In order to automate the process of the script, you should add it to the SYSTEM autostart scripts according that the init that you are using, for systemd we have a .service file in the files folder.


Delete the tor-router configuration lines in /etc/tor/torrc, disable the tor-router.service using systemctl (if you used the script), remove /usr/bin/to

For more depth analysis visit SOURCE : 1

An Ethical hacker should know the penalties of unauthorized hacking into a system. Read more at: Legality and Ethics

#TORbrowser #tor #torbrowser #torbridge #torbridges #torproject #orbot #QRcode #privacy #humanright #protectjulianassange #julianassange #wikileaks #freedom #censorship #telegram #socks5 #vpn #qrcodes #antifilter #tech #sec #security #RunTorBridges #scamrap #teejayx6 #shittyboys #darkweb #deepweb #dark


For more tricks and update over hacking stay tuned to our site: Note 4 Tech


Recent Posts

See All