Results 1 to 1 of 1
Thread: Using Tor as a socks proxy
10-01-2014, 06:53 PM #1
Using Tor as a socks proxy
So since every script I see for automating functions, or even packeting hosts uses socks proxies(WHY), that must be scraped individually, here's a quick and easy solution to cure your autism.
So most of you, I hope, have Tor, or have used Tor before reading this. If you don't have Tor installed, do it now as it's needed for this.
First you're going to want to grab Socksipython from SF
Now, instead of loading via some shitty proxy text file filled with hosts you found on HF, or LSX, you can just do this.
import socks import socket socket.socket = socks.socksocket socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050)
You may not realize this, but if you visit
http://127.0.0.1:9050 in your browser, Tor has a nifty message for you letting you know that it is indeed a SOCKS proxy that can be utilized outside of it's own client(Firefox).
So please, stop making your users scrape proxies unless the site you're connecting to for whatever reason(acc creation, ddos, whatever) has all Tor nodes banned.