Automated identity protection and circuit rotation for the privacy-conscious researcher.
Tor Switch is designed to solve the common issue of static identity during security research. By automating the rotation of Tor circuits, it ensures that your digital footprint remains unpredictable and your real IP address stays hidden.
[INFO] Initializing Tor-Switch Core...
[OK] Connected to Tor Controller (Signal: NEWNYM)
[INFO] Current IP: 185.129.x.x (London, UK)
[ACTION] Requesting new identity...
[OK] Path: UK -> DE -> NL [Circuit 142]
[OK] New Exit Node: 45.147.x.x (Amsterdam, NL)
[STATUS] Anonymity Level: HIGH
Simulates organic traffic patterns by adding random delays and packet-size variations to thwart timing attacks.
Automatically modifies request headers and browser signatures to prevent web-based tracking.
Specify custom exit nodes or exclude certain countries for location-specific research needs.
Directly interfaces with the Tor control port using the STEM library to force new circuits and clear internal DNS caches instantly.
A kernel-level firewall monitor that drops all non-Tor traffic if the proxy connection becomes unstable or is compromised.
Allow external tools to trigger IP changes via a lightweight REST endpoint or local socket for seamless integration into web scrapers.
| Protocol | SOCKS5, HTTP, Transparent Proxy |
| Language Core | Python 3.10 / Bash |
| Encryption | AES-256 (Native Tor Layer) |
| Architecture | Headless CLI / Systemd Service |
| Dependencies | Tor, Stem, Iptables/Nftables |
Establish authenticated connection to the local Tor proxy controller.
Configure firewall rules to block all direct (un-proxied) outbound connections.
Request new circuits based on time intervals or traffic thresholds.
Verify new exit node geographic status and IP resolution integrity.