Tor Switch

Automated identity protection and circuit rotation for the privacy-conscious researcher.

Why Use Tor Switch?

Tor Switch is designed to solve the common issue of static identity during security research. By automating the rotation of Tor circuits, it ensures that your digital footprint remains unpredictable and your real IP address stays hidden.

  • Rapid IP rotation intervals with sub-second switch times
  • Multi-hop circuit randomization across global nodes
  • Intelligent IP Leak Guard with integrated kill-switch
  • Automated CLI API for script integration
tor-switch --status

[INFO] Initializing Tor-Switch Core...

[OK] Connected to Tor Controller (Signal: NEWNYM)

[INFO] Current IP: 185.129.x.x (London, UK)

[ACTION] Requesting new identity...

[OK] Path: UK -> DE -> NL [Circuit 142]

[OK] New Exit Node: 45.147.x.x (Amsterdam, NL)

[STATUS] Anonymity Level: HIGH

Traffic Jitter

Simulates organic traffic patterns by adding random delays and packet-size variations to thwart timing attacks.

Anti-Fingerprinting

Automatically modifies request headers and browser signatures to prevent web-based tracking.

Geo-Targeting

Specify custom exit nodes or exclude certain countries for location-specific research needs.

Privacy Engine Modules

Multi-hop Circuit Controller

Directly interfaces with the Tor control port using the STEM library to force new circuits and clear internal DNS caches instantly.

Intelligent Leak Guard

A kernel-level firewall monitor that drops all non-Tor traffic if the proxy connection becomes unstable or is compromised.

Automated Rotation API

Allow external tools to trigger IP changes via a lightweight REST endpoint or local socket for seamless integration into web scrapers.

Technical Specs

Protocol SOCKS5, HTTP, Transparent Proxy
Language Core Python 3.10 / Bash
Encryption AES-256 (Native Tor Layer)
Architecture Headless CLI / Systemd Service
Dependencies Tor, Stem, Iptables/Nftables

The Anonymity Workflow

01

Initialize

Establish authenticated connection to the local Tor proxy controller.

02

Isolate

Configure firewall rules to block all direct (un-proxied) outbound connections.

03

Rotate

Request new circuits based on time intervals or traffic thresholds.

04

Audit

Verify new exit node geographic status and IP resolution integrity.

Deploy the Tool

Download on GitHub