I hear some of you shouting in the back, why would you do that, just use the TOR browser. Erm, yeah, sure, but what about the rest of the traffic your machine generates? Where does that go, dev/null?
Let’s go through the super easy to use tool that will route all of your traffic through TOR.

What is TOR (refresher)

Here’s what TOR does for your traffic in a super-simple illustration:

Tor routing illustrated

For an in-depth TOR explanation check the official site:

Suggested book (affiliate link): Deep Web: The Hunt For Dread Pirate Roberts


Step 1. Have a Kali Linux machine

Yeah, I know, boooo. But wait, I’m currently working on a script that should allow you to do the same in Ubuntu. So, if you’re not Kali-ing at the moment, check back here for an update on that project. Sorry folks.

Step 2. Have a keyboard

Step 3. PIP (Python magic sauce)

The package requires Python 2.7, grab that if don’t have it already.

Get PIP installed (what is PIP:

sudo apt install python-pip

Step 4. Grab the git (not all of it obviously)

Git clone this:

git clone

Step 5. Granting executable permissions

Go inside the directory by running:

cd torghost/

Grant the permissions

chmod +x

Step 6. Install the ghost


And you’re done, here’s what can be seen in the terminal, once you run torghost:

TorGhost welcome screen


Run torghost start to start a new session. The script will wrap your traffic tightly and will keep it nice and warm in an onion formation.

Output for start:

TorGhost start command output

The Current IP is your new wrapped IP address, meaning the one that’s exiting the router

Output for switch:

TorGhost switch command output

Again, your Current IP is the exit node

Output for stop:

TorGhost stop command output


That’s it, super simple stuff, but it keeps you protected when you’re going about your legal pen-tests (remember, always get permission!)

Keep an eye out for the Ubuntu script, that’s in the makings.