Anonymizer Linux


How to hide your real public IP address using Kali Linux

How to hide your real public IP address using Kali Linux

Anonymizer Universal is installed as an OpenVPN configuration.
OpenVPN must be installed to connect to Anonymizer Universal.
Use of OpenVPN requires a user with administrative privileges, commonly provided via sudo.
Firstly, you have to download 4nonimizer on kali Linux, If not installed.
Click here to copy the link of 4nonimizer.
Let Start to hide your real public IP address – anonymizer
Firstly, we know about what is my current ip
Step 1: – To download 4nonimizer on kali Linux
Type Command on Terminal: – git clone
Step 2: – Check 4nonimizer is sucessfully downloaded.
Step 3: – Copy 4nonimizer folder and paste on Desktop
Step 4: – Enter in 4nonimizer folder
Type These Commands:- To Enter Desktop:- cd Desktop
To Enter 4nonimizer Folder:- cd 4nonimizer
To check Directory:- ls
Step 5: – Type Command:-. /4nonimizer /help
Step 6: – To install 4nonimizer
Type Command:-. /4nonimizer install
Step 7: – After sucessfully installed, To Start 4nonimizer
Type Command:-. /4nonimizer Start
Step 8: – You have done!
Now Got a new anonymous public ip.
Step 9: – Check on browser
just type: – what is my ip
Step 10: – if you want to stop the 4nonimizer.
Type command on Terminal: -. /4nonimizer stop
you can use these of 4nonimizer commands
install: Install the script in /opt/4nonimizer and in running services
uninstall: Disable run service and remove app directory
change_provider: Change VPN Provider
change_ip: Change IP from current VPN provider
vpn_status: Check IP and running VPN provider
update_vpns: Update all ovpn of VPNs
start: Init the 4nonimizer service
stop: Stop the 4nonimizer service
stop_nonet: Stop the 4nonimizer service and shutdown network interfaces
restart: Restart the 4nonimizer service
update_app: Update this program via git
privoxy: Install and configure privoxy on port 8118 (BETA)
proxychains4: Install and configure proxychains4 by default in the system
browser: Fire up a firefox browser with profile privoxy -> tor
test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable
location: Now you can select a specific country or continent of the vpn peer
enableboot: You can enable service in boot
disableboot: You can disable service in boot
enable_dns: Enable dnscrypt service
disable_dns: Disable dnscrypt service
help: Help (this screen)
For References:-
I hope you enjoyed this article.
Must read:
Advanced Search Technique Using Google Dork
How To Setup And Use anonsurf On Kali Linux | Stay Anonymous
How to Download and Install Wamp Server on Windows 10
How to Hide IP and MAC Address using Anonym8
Sharing is caring
You may also like:-
Reader Comments [15]
beli emas sekarang
thank you for this marvelous post, I am glad I discovered this web site on yahoo.
Visum Turkije
Hello! Do you know if they make any plugins to protect against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Any tips?
cincin kawin
Prretty ni? e? ost. I just stumbled upon your blog and widhed to say that I hav? truly enjoye? br? wsing your blog posts. After all I’ll b? subscribing to yo? r rss fe? d and I hope you write again soon!
Thanks for another magnificent post. Where else may anyone get that kind of information in such an ideal way of writing? I have a presentation subsequent week, and I am at the search for such info.
It is truly a great and helpful piece of info. I’m happy that you simply shared this helpful information with us. Please stay uus informed like this. Thank you for sharing.
Very soon this web page will bee famous among all blog people, due to it’s nice content
Every weekend i used to visit this website, foor the reason that i want enjoyment, for the reason that this this web page conations truly nice ffunny material too.
Wow, wonderful blog layout! Hoow long have you been blogging for? you make bloggig look easy. The overall look of your site is magnificent, let alone the content!
Valuable info. Lucky me I found your website unintentionally, and I am stunned wwhy this coincidence didn’t happened earlier! I bokmarked it.
Your meanns of explaining all in this piehe of writing is actually nice, every one be able to withouut difficulty understand it, Thanks a lot.
Fantastic post but I was wondering if yoou could write a litte more on this topic? I’d be very grateful if yyou could elaborate a little bit you!
What’s up colleagues, good paragraph and good arguments commented here, I am truly enjoying by these.
Woow that was odd. I just wrote an extremely long commsnt but after I clicked submit my comment didn’t show well I’m not writing all that over again. Anyhow, just wanted tto say fantastic blog!
Helpful information. Lucky me I found your web site by accident, and I’m shocked why this twist of fate didn’t took place earlier! I bookmarked it.
I blog often and I genuinely appreciate your great article has truly peaked my interest. I will take a note of your blog and keep checking for new details about once per week. I opted in for your RSS feed too.
Hackplayers/4nonimizer - GitHub

Hackplayers/4nonimizer – GitHub

If you like the 4nonimizer, please help us with whatever you want!
It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers ( files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.
This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.
Since version 1. 06 the dns resolution requests are done throught DnsCrypt (enable and disable with option enable_dns or disable_dns)
Since version 1. 12 the logs of connections vpn saved in sqlite in /logs/
If you are a provider, you support OpenVPN and want your VPN to be integrated into 4nonimizer contact the developers at hackplayers @
Download the repo using git, execute the command. /4nonimizer install in the directory, and follow the screen instructions, 4nonimizer will move to the directory /opt/ and installed as a service.
This script has full compatibility with Kali Linux, although it has been properly tested and should also work on other distributions like Debian, Ubuntu and Arch (Manjaro). However there could be some bugs, or unexpected performances (please comments if you find any! ).
Once installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters:
___ _ _
/ | (_) (_)
/ /| |_ __ ___ _ __ _ _ __ ___ _ _______ _ __
/ /_| | ‘_ \ / _ \| ‘_ \| | ‘_ ` _ | |_ / _ \ ‘__|
\___ | | | | (_) | | | | | | | | | | |/ / __/ |
|_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_|
By Carlos Antonini & Vicente Motos
Version: 1. 06-beta
Usage: 4nonymizer install: Install the script in run services
uninstall: Disable run service and remove app directory
change_provider: Change VPN Provider
change_ip: Change IP from VPN current
vpn_status: Check IP and provider VPN running
update_vpns: Update all ovpn of VPNs
start: Init the 4nonimizer service
stop: Stop the 4nonimizer service
stop_nonet: Stop the 4nonimizer service and shutdown network interfaces
restart: Restart the 4nonimizer service
update_app: Update this program via git
privoxy: Install and configure privoxy with port 8118 (BETA)
proxychains4: Install and configure proxychains4 for default in the system
browser: Fire up a firefox browser with profile privoxy -> tor
test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable
location: Now you can select a specific country or continent of the vpn peer
enableboot: You can enable service in boot
disableboot: You can disable service in boot
enable_dnscrypt: Enable dnscrypt service
disable_dnscrypt: Disable dnscrypt service
help: Help (this screen)
Currently it supports the following VPN providers:
– 7Proxies – AirVPN – Cryptostorm – Cyberghost – ExpressVPN – FreeVPN – HideMyAss – IpPVanish – NordVPN – PIA – ProntonVPN – – SlickVPN – StrongVPN – TorGuard – TunnelBear – VPNBook (por defecto) – VPNGate – VPNKeys – VPNMe – Vyprvpn
To install an additional vpn we have to use the following structure in order to the 4nonimizer be able to integrate and perform operations with it.
First, we have to create the following dir structure /vpn/ within 4nonimizer path:
In our example we create the folder /vpntest/ and within it placed all files we have. If the files ovpn not have the certificate within each of them we put in the same folder as shown in the example
In addition, we must place a file named containing 2 lines: the first one with the username and the second one with the password, as shown below:
If we have correctly performed all steps when we execute the command 4nonimizer change_provider the menu will show our vpn:
As you can see in the picture, option [7] it is the vpn we’ve created.
If the VPN provider allows automation of credential and/or files getting, 4nonimizer has standardized the following scripts names and locations:
– /opt/4nonimizer/vpn/provider/
4nonimizer automatically detect the presence of both scripts and indicate (Auto-pass Login) or (Auto-get OVPN) if it finds in the first line of each file the expression ‘#4uto’ or ‘#m4nual’ depending on the performed actions.
– Execute ‘source 4nonimizer’ to activate autocompletation of parameters.
– Copy. conkyrc in your home directory to load a 4nonimizer template and execute conky.
– – – – –
– Instalar 4nonimizer Kali Linux – 4nonimizer Navegando de manera segura VPN (Kali Linux 2016. 2) – devenir anonyme sur kali linux (4nonimizer) – Anonymizer – How To Hide Your IP address on Kali Linux 2016. 2 (Change IP) – Become Anonymous on kali linux 2016. 2 – Auto Hide IP with 4nonimizer on KALI Linux 2017 – Kali Linux – 4nonimizer | Surf Anonymously
1. 00-beta!
1. 02-beta
1. 03-beta
1. 04-beta. locateit
1. 05-beta. encrypting
1. 06-beta. 1st-trial
1. 07-beta
1. 08-beta
1. 09-beta
1. 10. fresh_air
1. 11
1. 12. sqliting
¡4nonimize the world!
– migrate to Python and make the tool multiplatform
– make the code cleaner and more versatile
– save the logs in a bd sqlite
– standardize the names of the ovpn files: read the IP (remote line), get the country and rename the ovpn file accordingly
Te gusta 4nonimizer, por favor ayudanos con lo que quieras!
Es un script en bash cuyo objetivo es anonimizar (de momento) la IP pública con la que salimos a Internet mediante la gestión del proceso de conexión a TOR y a distintos proveedores VPNs (OpenVPN), ya sean gratuitos o de pago. Por defecto incluye preconfiguradas varias VPN automatizando la conexión a distintos peers y la descarga de credenciales correspondientes (si el proveedor lo soporta). Además por defecto registra en ficheros logs la IP que usamos cada 300 segundos.
Este script se habilita como servicio en sistemas systemd y levanta la vpn por defecto (VPNBook) en el inicio del sistema.
Desde la version 1. 06 las resoluciones DNS se hacen a través de DnsCrypt (habilitarlo y desabilitarlo con la opcion enable_dns o disable_dns).
Desde la versión 1. 12 los registros de las conexiones vpn se guardan en sqlite en /logs/
Si eres un proveedor, soportas OpenVPN y quieres que tu VPN sea integrada en 4nonimizer contacta con los desarroladores en hackplayers @
Descargar el repositorio mediante git, ejecutar la instruccion. /4nonimizer install dentro del directorio, y seguir las intrucciones por pantalla, 4nonimizer se moverá al directorio /opt/ y se instalará como servicio.
Este script tiene compatibilidad completa con Kali Linux, aunque ha sido probado y debería funcionar correctamente también en otras distribuciones como Debian, Ubuntu y Arch (Manjaro). No obstante podrían darse algunos bugs, o funcionamientos inesperados (¡por favor, comenta si encuentras alguno! ).
Una vez instalado 4nonimizer, introduce el comando 4nonimizer help para obtener la ayuda, la cual nos muestra todos los parámetros disponibles:
*enable_dnscrypt: Enable dnscrypt service
Actualmente se soportan los siguientes proveedores VPN:
Para poder instalar una vpn adicional tendremos que tener en cuenta la siguiente estructura para que 4nonimizer la integre en el script y pueda realizar operaciones con ella.
Lo primero, deberemos de crear la siguiente estructura en la carpeta /vpn/ dentro de la ruta de 4nonimizer:
En nuestro ejemplo creamos la carpeta /vpntest/ y dentro de ella colocamos todos los que dispongamos. En caso de que los ficheros ovpn no tuvieran el certificado dentro de cada uno de ellos lo deberemos poner en la misma carpeta como se muestra en el ejemplo
Además de todo ésto deberemos de colocar un fichero llamado que contenga 2 líneas: en la primera el usuario y en la segunda la contraseña, como se muestra a continuación:
Si hemos realizado correctamente todos los pasos cuando escribamos el comando 4nonimizer change_provider nos deberá de mostrar nuestra vpn:
Como se puede apreciar en la imagen la opcion [7] es la vpn que hemos creado.
Si el proveedor correspondiente permite la automatización de la obtención de credenciales y/o ficheros, 4nonimizer tiene normalizado que los scripts correspondientes tengan la ubicación y nombres siguientes:
4nonimizer automáticamente detectará la presencia de ambos scripts e indicará (Auto-pass Login) o (Auto-get OVPN) si encuentra en la primera linea de cada fichero la expresión “4uto’ o ‘m4nual’ dependiendo de la función que realicen.
– Ejecuta ‘source 4nonimizer’ para habilitar el autocompletado de parámetros.
– Copia. conkyrc en tu directorio home para cargar la plantila de 4nonimizer y ejecuta conky.
¡4nonimiza el mundo!
– migrar a Python y hacer la herramienta multiplataforma
– hacer el código más limpio y versátil
– guardar los logs en una bd sqlite
– estandarizar los nombres de los ficheros ovpn: leer la ip o el fqdn de la linea remote, obtener el país y renombrar el fichero ovpn en consecuencia
– forzar la resoluciób DNS a través del túnel VPN
Whonix - Software That Can Anonymize Everything You Do ...

Whonix – Software That Can Anonymize Everything You Do …

Whonix – Software That Can Anonymize Everything You Do Online
Security Features
Download, Install, Run FREE
Whonix ™
isn’t a program like most of your applications. It’s a full
operating system that runs inside your current one. Select which
operating system your computer is running.
All activity in a virtual machine, all internet traffic through the
Whonix is the best way to use
and provides the strongest protection of your IP address.
Applications are reviewed and pre-configured.
Fully Featured and Advanced Security Features
Impossible to leak IP address
Connections are forced through Tor®. DNS leaks are impossible, and
even malware with root privileges cannot discover the user’s real IP
address. Leak tested through corridor (Tor® traffic whitelisting gateway) and other leak tests.
Live Mode
Booting into
VM Live Mode
is as simple as choosing Live Mode in the boot menu.
Alternatively Debian, Kicksecure and perhaps other Debian-based hosts can boot their existing host operating system into
Host Live Mode.
Based on Kicksecure ™
Whonix ™ is based on Kicksecure ™ which is a security-hardened Linux distribution.
Based on Tor®
Whonix utilizes Tor®, which provides an open and distributed relay network to defend against network surveillance.
Unlike Virtual Private Networks (VPN), Tor provides anonymity by design and removes trust from the equation.
Keystroke Anonymization
Keystrokes can be used to track users. To prevent this, Whonix comes with kloak installed by default.
Protect against guard discovery and related traffic analysis attacks
Entropy Enhancements
Better encryption thanks to preinstalled random number generators.
Stream Isolation
Distinct applications are routed through different paths in the Tor® network.
AppArmor profiles restrict the capabilities of commonly used, high-risk applications.
Kernel Self Protection Settings
Whonix uses Kernel Hardening Settings as recommended by the Kernel Self Protection Project (KSPP).
Virus Protection
Whonix provides additional security hardening measures and user education to provide better protection from viruses.
Console Lockdown
disables legacy login methods for improved security hardening.
Advanced Firewall
Configured for anonymous Tor® use.
Tor® Browser
Tor® Browser is optimized for anonymity and millions of daily users help you blend in with the crowd.
Visit any destination including modern websites such as YouTube.
Running low on RAM isn’t a security problem. swap-file-creator
will create an encrypted swap file.
Complete respect for privacy
Whonix respects data privacy principles. We don’t make advertising deals or collect sensitive personal data. We’re funded directly by user contributions and that’s how it should be.
Warrant Canary
A canary
confirms that no warrants have ever been served on the Whonix project.
Based on Debian
In oversimplified terms, Whonix is just a collection of configuration files and scripts. Whonix is not a stripped down version of Debian; anything possible in “vanilla” Debian GNU/Linux can be replicated in Whonix.
About Whonix
Digitally signed releases
Downloads are signed so genuine Whonix releases can be verified.
Open Source
All the Whonix source code is
licensed under OSI Approved Licenses.
We respect user rights to review, scrutinize, modify, and redistribute Whonix. This improves security and privacy for everyone.
Research and Implementation Project
Whonix makes modest claims and is wary of overconfidence. Whonix is an actively maintained research project making constant improvements; no shortcomings are ever hidden from users.
Upcoming Security Enhancements

Frequently Asked Questions about anonymizer linux

Does Kali Linux hide your IP?

Anonym8 is a free and open-source tool for becoming anonymous on the Internet while testing the security of a web browser. Anonym8 can move the network of your Kali Linux operating system through the Tor Network. …Jun 17, 2021

Is Kali Linux private?

Running Kali Linux in a virtual machine can be an ideal hacking platform for launching attacks, but is only as anonymous or private as the connection used.Oct 4, 2017

Is Kali Linux traceable?

Kali Linux provide the software as it is. … Now don’t think that you can’t be tracked just because you are using Kali, many systems are configured to have complex logging devices to simply track whoever tries to listen or hack their networks, and you may stumble upon one of these, and it will destroy you life.Dec 23, 2018

About the author


If you 're a SEO / IM geek like us then you'll love our updates and our website. Follow us for the latest news in the world of web automation tools & proxy servers!

By proxyreview

Recent Posts

Useful Tools