In addition, you can view previously running TOR processes and create a new identity for all or selected processes.
multitorhas been completely rewritten on the basis of:
multitor was created with the aim of initialize many TOR processes as quickly as possible. I could use many instances for my daily use programs (web browsers, messangers and other). In addition, I was looking for a tool that would increase anonymity when conducting penetration tests and testing the security of infrastructure.
Before using the
multitor you need to remember:
multitorgetting some bandwidth improvements just because it's a different way of connecting to TOR network
multitorconfiguration mostly HAProxy checks the local (syn, syn/ack) socket - not all TOR nodes (also exist nodes). If there is a problem with the socket it tries to send traffic to others available without touching what's next - it does not ensure that the data will arrive
multitorhas no effect If one of the nodes is damaged and somehow the data can not leave the exit node, it is likely that a connection error will be returned or, at best, the data will be transferred through another local socket
TOR is a fine security project and an excellent component in a strategy of defence in depth but it isn’t (sadly) a cloak of invisibility. When using the TOR, always remember about ssl (e.g. https) wherever it is possible.
Look also at Limitations.
❗️ For a more detailed understanding of
multitor, its parameters, functions and how it all works, see the Manual.
# Clone this repository git clone https://github.com/trimstray/multitor # Go into the repository cd multitor # Install ./setup.sh install # Run the app multitor --init 2 --user debian-tor --socks-port 9000 --control-port 9900 --proxy privoxy --haproxy
- symlink to
bin/multitoris placed in
- man page is placed in
Provides the following options:
Usage: multitor <option|long-option> Examples: multitor --init 2 --user debian-tor --socks-port 9000 --control-port 9900 multitor --init 10 --user debian-tor --socks-port 9000 --control-port 9900 --proxy socks multitor --show-id --socks-port 9000 Options: --help show this message --debug displays information on the screen (debug mode) --verbose displays more information about TOR processes -i, --init <num> init new tor processes -k, --kill kill all multitor processes -s, --show-id show specific tor process id -n, --new-id regenerate tor circuit -u, --user <string> set the user (only with -i|--init) --socks-port <port_num|all> set socks port number --control-port <port_num> set control port number --proxy <proxy_type> set socks or http (polipo, privoxy, hpts) proxy server --haproxy set HAProxy as a frontend for http proxies (only with --proxy)
multitor uses external utilities to be installed before running:
This tool working with:
Also you will need root access.
See this project: docker-multitor
If you use this tool in other scripts where the output is saved everywhere, not on the screen, remember that you will not be able to use the generated password. I will correct this in the next version. If you do not use regenerate function of single or all TOR circuits with a password, you can safely restart the
multitor which will do it for you.
multitor- How to run multiple Tor processes at once with different exit IPs?
GPLv3 : http://www.gnu.org/licenses/
Free software, Yeah!