⭕NOTE: If poeple actually require and use this, then I would love to make this into a Python Library and continue development.
- First make sure you ahve Tor installed on the system.
$ sudo apt update
$ sudo apt install Tor- After the installation of Tor follow the below steps:
- Restart the Service:
bash $ sudo /etc/init.d/tor restart - Generate Password for the Serivice: (replace with phrase of your choice)
Make note of the hash generated here. It will be required later on. -To enable the listening of Tor we edit the config file for Tro client.$ tor --hash-password <enter your password here> OUTPUT: ---------------------------------------------- 16:437b930db84b8079c2dd804a71936b5f
Uncomment the lines that are similar to:$ gedit ./etc/tor/torrc #Default location of the torrc file.Paste the Hash generated in the last step wtih .SOCKSPort 9050 HashedControlPassword <your hashed passsword obtained earlier here> CookieAuthentication 1- Save and restart the service.
$ sudo /etc/init.d/tor restart
- Restart the Service:
- You guys have it easy. Make sure you have Tor browser install on your system. If not visit this site.
- Thats it. You have nothing else to do.
#Instantiate the Object
something = Trequests()
#Normal Public IP
something.checkIP()
something.launchTor()
#Obtaining new IP for your Hacker Self
something.set_new_ip()
something.checkIP()- Windows Support.
- Linux Support. {Partial Support available, few changes to be added}
- Wrape the Requests Package.
- Add support for using User-defined Proxies.