AnonSuite is a command-line toolkit I built after years of frustration with fragmented security tools. It pragmatically integrates battle-tested open-source components into a unified platform for multi-layered traffic obfuscation and network security auditing. This reflects a real-world development approach - balancing robust engineering with maintainable code that actually works in production.
Yes, absolutely! You can verify this immediately:
# Test it right now (works immediately after cloning)
git clone https://github.com/morningstarxcdcode/AnonSuite.git
cd AnonSuite
python src/anonsuite/main.py --demo
python src/anonsuite/main.py --health-check
Core functionality works immediately - no installation required. For full features, AnonSuite will tell you exactly what dependencies you need.
π Complete Real-World Usage Guide | π§ͺ Run Validation Test |
Immediate Usability Test (works right after cloning):
./validate_usability.sh # Comprehensive validation
Quick Verification (3 commands):
python src/anonsuite/main.py --version # β Version info
python src/anonsuite/main.py --demo # β Feature demo
python src/anonsuite/main.py --health-check # β System status
Production Use Cases:
AnonSuite orchestrates external binaries. Install them via Homebrew (macOS) or your systemβs package manager:
# Install Tor
brew install tor
# Install Privoxy
brew install privoxy
# Install HAProxy
brew install haproxy
# Install pidof (part of proctools on macOS)
brew install proctools
# Clone the repository
git clone https://github.com/morningstarxcdcode/AnonSuite.git
cd AnonSuite
# Make multitor scripts executable
chmod +x src/anonymity/multitor/multitor \
src/anonymity/multitor/__init__ \
src/anonymity/multitor/CreateTorProcess \
src/anonymity/multitor/CreateProxyProcess
Important: multitor requires specific permissions and port availability. Follow these steps carefully:
sudo chown -R $USER ~/Desktop/AnonSuite/src/anonymity/multitor/tor_9000
# Repeat for any other tor_* directories if they exist
lsof -i :8118
# If a process is listed, kill it (replace <PID> with the actual process ID)
sudo kill <PID>
sudo nano /opt/homebrew/etc/privoxy/config
# Find the line: listen-address 127.0.0.1:8118
# Change 8118 to an unused port, e.g., 8119:
# listen-address 127.0.0.1:8119
# Save and exit (CTRL+O, Enter, CTRL+X)
Once prerequisites and initial setup are complete, run multitor with your actual username. The output will be logged live to your terminal and saved to multitor.log.
# Replace <YOUR_USERNAME> with your actual system username
sudo /Users/$USER/Desktop/AnonSuite/src/anonymity/multitor/multitor \
--user $USER \
--socks-port 9000 \
--control-port 9001 \
--proxy privoxy \
--haproxy yes
AnonSuite/
βββ src/ # Core application code
β βββ anonsuite.py # Main CLI interface
β βββ config_manager.py # Configuration management system
β βββ anonymity/ # Tor and proxy modules
β β βββ multitor/ # Core multitor scripts and helpers
β β βββ multitor
β β βββ __init__
β β βββ CreateTorProcess
β β βββ CreateProxyProcess
β β βββ helpers
β β βββ settings
β β βββ multitor.log # Operational logs
β βββ wifi/ # WiFi auditing tools
β βββ pixiewps_wrapper.py
β βββ wifipumpkin_wrapper.py
β βββ wifi_scanner.py
βββ tests/ # Comprehensive test suite
β βββ unit/ # Unit tests
β βββ integration/ # Integration tests
β βββ security/ # Security tests
βββ docs/ # Project documentation
β βββ installation.md # Installation guide
β βββ user-guide.md # User documentation
β βββ troubleshooting.md # Troubleshooting guide
βββ config/ # Configuration files
βββ plugins/ # Plugin system
βββ run/ # Runtime files and logs
βββ .github/ # GitHub Actions CI/CD workflows
β βββ workflows/
β βββ ci.yml # Automated testing pipeline
βββ .env.example # Environment variables template
βββ architect-state.json # Project state tracking
βββ pyproject.toml # Python project configuration
βββ README.md # You are here
# Start the interactive menu
python src/anonsuite.py
# Check version and health
python src/anonsuite.py --version
python src/anonsuite.py --health-check
# Anonymity operations
python src/anonsuite.py --start-anonymity
python src/anonsuite.py --anonymity-status
python src/anonsuite.py --new-circuit
# WiFi operations
python src/anonsuite.py --wifi-scan
python src/anonsuite.py --wifi-scan --wifi-interface wlan0
# Configuration management
python src/anonsuite.py --config-wizard
python src/anonsuite.py --list-profiles
python src/anonsuite.py --create-profile production
# Plugin system
python src/anonsuite.py --list-plugins
python src/anonsuite.py --run-plugin "Network Info Plugin"
The project includes a comprehensive testing framework:
# Run all tests
pytest
# Run specific test categories
pytest tests/unit/ # Unit tests
pytest tests/integration/ # Integration tests
pytest tests/security/ # Security tests
# Run with coverage
pytest --cov=src --cov-report=html
A GitHub Actions workflow ensures code quality and consistency:
This toolkit is designed for:
The developers are not responsible for misuse of this software. Users must ensure compliance with applicable laws and obtain proper authorization before conducting any security assessments.
We welcome contributions! The project follows standard open-source practices:
See our Contributing Guide for detailed guidelines.
This project is licensed under the MIT License - see the LICENSE file for details.
Special thanks to the developers of the integrated tools:
Important: This tool is for authorized security testing only. Always ensure you have proper permission before conducting any security assessments. The developers assume no liability for misuse of this software.