• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

tor

  1. dEEpEst

    VPN vs. Tor vs. Proxy

    VPN vs. Tor vs. Proxy: Which Is Truly the Best for Anonymity? 📑 Index Introduction What Is a Proxy? What Is a VPN? What Is Tor? Technical Comparison Table Practical Use Cases Combining Technologies Conclusion Resources and Tools Disclaimer Introduction In the field of cybersecurity...
  2. dEEpEst

    The Ultimate Dark Web, Anonymity, Privacy & Security Course 2025 8GB Duration 10 hours

    Do you want to Protect your privacy and security? How about accessing the dark web? If so, then you found the right course! With no prior knowledge required this course will take you from a beginner to advanced in all of these topics; teaching you how to properly and securely discover data and...
  3. Parky_

    Configs [OPENBULLET2] TorGuard VPN CONFIG

    URL: Torguard.net BOTS: 50-100 PROXY: YES CAPTURE: NO COMBOLIST: EMAIL & PASS Hidden content You should Also Check what I'm selling on the MarketPlace By Clicking Here & Here.
  4. dEEpEst

    Myth of Levels in the Network Tor

    Debunking the Myth of ‘Dark Layers’ in the Tor Network: Understanding How Tor and TCP/IP Really Work Introduction The Tor network, often associated with the “dark web,” is frequently misunderstood and misrepresented. A common myth suggests that Tor contains progressively “darker” layers, where...
  5. dEEpEst

    The VPN Privacy Lie

    The VPN Privacy Lie: What You Need to Know Before Trusting VPNs for Privacy Introduction Virtual Private Networks (VPNs) are widely marketed as a simple way to achieve online privacy, security, and anonymity. Many VPN providers claim they can hide users’ online activities from hackers, internet...
  6. dEEpEst

    Tools Geph 4.99.8

    Geph 4.99.8 The new update is available now Free It has the ability to connect to a bridge for extreme filtering situations socks5 HTTP protocol based on Tor You have a bridge during filtering Four layers of encryption No e-mail is required, you only see a username and password when...
  7. dEEpEst

    News Hack Tools Dark [HTDark.CoM] Available as a Hidden Service - TOR Network

    We’re excited to announce that Hack Tools Dark [HTDark.CoM] is now accessible as a hidden service on the Tor network. This means you can enjoy enhanced privacy and anonymity while browsing our site. To access our Tor version, simply use the Tor Browser and enter the following address...
  8. dEEpEst

    Montar un VPS de proxy inverso en la red TOR para mostrar el contenido de otro VPS en la Clearnet

    Este proyecto tiene como objetivo configurar un servidor VPS como un proxy inverso en la red TOR para mostrar el contenido de otro VPS en la clearnet. Utiliza Nginx como servidor web y proxy inverso, junto con un certificado SSL autofirmado generado por OpenSSL para proporcionar cifrado y...
  9. dEEpEst

    RansomWatch - this is the server side code written in nodejs for screenshotting Tor websites

    contents this is the server side code written in nodejs for screenshotting Tor websites. The code itself is just a puppeteer that connects to tor websites through a TOR proxy (which I setup on a different server. See the image below for instructions on how to setup a tor proxy) Its written as...
  10. itsMe

    Tornado - Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Portforwarding

    What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward...
  11. itsMe

    Tornado: Anonymously Reverse shell over Tor Network using Hidden Services without portfortwarding

    Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have...
  12. itsMe

    Kalitorify v1.27.1 - Transparent proxy through Tor for Kali Linux OS

    kalitorify is a shell script for Kali Linux which use iptables settings to create a transparent proxy through Tor Network, the program also allows you to perform various checks like checking the Tor Exit Node (i.e. your public IP when you are under Tor proxy), or if Tor has been configured...
  13. itsMe

    Phyton Tor Rootkit: Python 3 standalone Windows 10 / Linux Rootkit

    A Python 3 standalone Windows 10 / Linux Rootkit. The networking communication get’s established over the tor network. Features     Standalone executable, including python interpreter and tor     The executable has a size of ~13MB on Windows and ~7MB on Linux     the whole communication works...
  14. itsMe

    Kalitorify v1.26.2 - Transparent proxy through Tor for Kali Linux OS

    kalitorify kalitorify is a shell script for Kali Linux which use iptables settings to create a transparent proxy through Tor Network, the program also allows you to perform various checks like checking the Tor Exit Node (i.e. your public IP when you are under Tor proxy), or if Tor has been...
  15. itsMe

    Phyton Poiana - Reverse shell over TOR network using hidden services

    Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws will be added, so url becomes available outside tor network -> Generate batch .rc file for msfconsole Hidden content
  16. itsMe

    Nipe v0.9.5 releases: make Tor Network your default gateway

    An engine to make Tor network your default gateway Summary The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other...
  17. itsMe

    TorghostNG - Make All Your Internet Traffic Anonymized Through Tor Network

    About TorghostNG TorghostNG is a tool that make all your internet traffic anonymized through Tor network. Rewritten from TorGhost with Python 3. TorghostNG was tested on:     Kali Linux     Manjaro     ... What's new in TorghostNG 1.2     Fixed update_commands and others in torghostng.py...
  18. T

    c# + tor

    hello guys Can someone share please, a c# RAT or botnet source with connection over tor for secure encryption   Cdt
  19. A

    Tor and Darkweb complete course by art4haxk

    This is very good course for you guys. If you are new to Dark web and tor browser.... READ RULES
  20. dEEpEst

    How to become Anonymous using Proxychains and Tor

    How to become Anonymous using Proxychains and Tor [B]Hidden content
Back
Top