Tor All in One - Dockerized Hidden Service
This project provides a Dockerized solution for hosting a Tor hidden service. It is designed for users seeking a highly automated setup with tools for domain generation, security scanning, and traffic monitoring.
- Docker
- Docker Compose
It is good to have a basic understanding of Docker and Docker Compose before using this project.
-
OnionBalance
requires a configuration file namedob_config
. Create this file in theconf
folder with the following content:MasterOnionAddress domain.onion
Make sure to replace
domain.onion
with your actual master onion address.
To spin up a Tor hidden service, you need to have Docker installed on your machine. The project is built using Docker Compose, and it contains a set of scripts for starting and stopping the project.
Note: This project contains two versions of images, Alpine and Debian. To switch between them, change the base image in
.env
file. The Alpine image is primarily used.
Use makefile to 'build' the project:
make install
To start or stop the project, use provided scripts:
# Run tor project
sudo ./startup.sh -p tor
# Stop tor project, remove built images
sudo ./shutdown.sh -p tor -remove
Project contains additional tools for generating .onion domain, scanning it, and monitoring Tor traffic.
# Replace [domain] with string of your choice, rather short like your name or nick, whatever.
docker run --volume ./domain:/root/mkp224o ghcr.io/vansergen/mkp224o -B -S 5 -t 5 -n 1 [domain]
To scan your .onion domain, use OnionScan:
./onionscan/startup.sh [domain]
To monitor Tor traffic, use Nyx:
./nyx.sh