Offensive Tor Toolkit
  • Introduction
  • TL;DR
  • Toolkit Overview
    • Download
    • reverse-shell-over-tor
    • hidden-bind-shell
    • hidden-portforwarding
    • tcp2tor-proxy
  • PoC - Proof Of Concept
    • Overview
    • Gaining access with reverse-shell-over-tor
    • Multi-shell access with hidden-bind-shell
    • Pivoting with hidden-portforwarding and Chisel
    • Remote port forwarding with tcp2tor-proxy
Powered by GitBook
On this page

Was this helpful?

Introduction

NextTL;DR

Last updated 3 years ago

Was this helpful?

is a series of tools that simplify the use of Tor for typical exploitation and post-exploitation tasks.

In exploitation and post-exploitation phases, the victim needs to access Tor. All of this tools have an embedded instance of Tor and they are completely separated from each other. In this way, you only need to upload one file to the victim in order to run the required action.

How it works?

is written in , a language that stands out for its good performance. Also, makes use of the following libraries:

  • : Self-contained Tor from Go.

  • : Go API for using and controlling Tor.

Offensive Tor Toolkit
Offensive Tor Toolkit
Golang
Offensive Tor Toolkit
ipsn/go-libtor
cretz/bine