Short description
Implements an automated IP-rotation controller that interfaces with Tor's ControlPort and routes traffic through a SOCKS5 proxy; optionally supports obfs4 bridges for DPI resistance.
- Tor ControlPort automation to request new circuits (NEWNYM) programmatically.
- Routing and verification of traffic via local SOCKS5 (socks5h://127.0.0.1:9050).
- obfs4 bridge support for environments subject to DPI/censorship.
- Debian/Kali Linux with Tor installed and ControlPort enabled.
- Python 3 environment with
stemandrequests[socks](or equivalent). - Local SOCKS5 proxy (Tor service) reachable at 127.0.0.1:9050.
- Ensure Tor is configured with ControlPort and authentication (cookie or password).
- Review
ghost_mode3.pyconfiguration options (interval, verification endpoint). - Launch the script in the isolated test environment and observe printed status and IP verification outputs.
The script includes logging and error handling; review tor logs if identity changes fail.
- Use for privacy research and testing only.
- Do not use to perform illegal acts, abuse third-party services, or bypass local laws and regulations.
- Respect terms-of-service of remote endpoints; use test endpoints when possible.
- If using obfs4, confirm
obfs4proxyinstallation and valid bridge lines intorrc. - DNS leaks: ensure local resolver does not leak host DNS queries (consider locking
/etc/resolv.confin controlled setups).
ghost_mode3.py— controller script.docs/— test logs, success/failure statistics, obfs4 instructions.