A shell script that creates a transparent proxy through the Tor network for Kali Linux, routing all system traffic anonymously.
kalitorify is a shell script for Kali Linux that creates a transparent proxy through the Tor network, routing all system traffic anonymously. It uses iptables to ensure every network connection passes through Tor, preventing IP leaks and enhancing privacy during security testing or sensitive browsing. The tool simplifies Tor integration without requiring per-application configuration.
Kali Linux users, such as penetration testers, security researchers, and privacy-conscious individuals, who need to anonymize all system traffic during operations or browsing.
Developers choose kalitorify for its simplicity and Kali-specific design, offering a lightweight, script-based alternative to complex setups. It provides automated iptables configuration for full-system Tor routing with built-in status checks, reducing manual effort and potential misconfigurations.
Transparent proxy through Tor for Kali Linux OS
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Designed exclusively for Kali Linux with a straightforward make install and commands like --tor and --clearnet, minimizing setup overhead for targeted users.
Automates iptables configuration to route all system traffic through Tor without per-application settings, preventing accidental IP leaks during security tasks.
Includes commands to verify Tor service status, check public IP, and restart Tor, offering easy monitoring and troubleshooting directly from the shell.
The README emphasizes risks like hostname exposure and Tor-over-Tor scenarios, providing warnings and leak-checking guides to promote safe usage.
Explicitly built for Kali Linux and not recommended for other distributions, severely restricting its applicability in mixed or non-Kali environments.
As a transparent proxy, it doesn't protect against hostname, MAC address, or malware leaks, and the README admits it doesn't guarantee 100% anonymity.
Demands disabling firewalls and backing up iptables, which can disrupt existing network setups and introduces risks if not managed carefully.