Complete guide for using AnonSuite’s anonymity and WiFi auditing capabilities.
After installation, start AnonSuite with:
# Interactive menu mode
python src/anonsuite.py
# Or run the configuration wizard first
python src/anonsuite.py --config-wizard
The main menu provides access to all AnonSuite features:
┌─ Main Menu ────────────────────────────────────
│ 1. • Anonymity (Tor + Proxy)
│ 2. • WiFi Auditing (Attacks & Scanning)
│ 3. • Configuration Management
│ 4. • System Status & Monitoring
│ 5. • Plugins
│ 6. • Help & Documentation
│ 0. → Back
└───────────────────────────────────────────────
Before using AnonSuite, run a health check:
python src/anonsuite.py --health-check
This verifies:
# Start all anonymity services
python src/anonsuite.py --start-anonymity
# Check status
python src/anonsuite.py --anonymity-status
# Request new Tor circuit
python src/anonsuite.py --new-circuit
src/anonymity/multitor/tor_9000/
# Edit Tor configuration
nano config/anonsuite.conf
# Key settings:
{
"anonymity": {
"tor": {
"socks_port": 9000,
"control_port": 9001,
"circuit_timeout": 60,
"new_circuit_period": 30
}
}
}
Privoxy provides HTTP proxy functionality with filtering:
/opt/homebrew/etc/privoxy/config
# Test Tor connectivity
curl --socks5 127.0.0.1:9000 https://check.torproject.org/api/ip
# Test HTTP proxy
curl --proxy 127.0.0.1:8119 https://httpbin.org/ip
# Check for DNS leaks
python src/anonsuite.py --anonymity-status
# Scan with default interface
python src/anonsuite.py --wifi-scan
# Scan with specific interface
python src/anonsuite.py --wifi-scan --wifi-interface wlan0
# Save results to file
python src/anonsuite.py --wifi-scan --output scan_results.json --format json
Scan results include security analysis:
# Interactive mode: WiFi Auditing → WPS PIN Attack
# Command line mode:
python src/anonsuite.py --wps-attack 00:11:22:33:44:55 --wifi-interface wlan0
# Interactive mode: WiFi Auditing → Start Rogue AP
# Command line mode:
python src/anonsuite.py --start-ap "FreeWiFi" --wifi-interface wlan0
python src/anonsuite.py --stop-ap
AnonSuite supports multiple configuration profiles:
# Interactive mode: Configuration Management → Create New Profile
# Command line mode:
python src/anonsuite.py --create-profile production
# List available profiles
python src/anonsuite.py --list-profiles
# Use specific profile
python src/anonsuite.py --profile production
# Export profile
python src/anonsuite.py --export-profile production /path/to/backup.json
# Import profile
python src/anonsuite.py --import-profile imported /path/to/backup.json
The configuration wizard helps set up AnonSuite:
python src/anonsuite.py --config-wizard
Wizard steps:
Edit configuration files directly:
# Main configuration
nano config/anonsuite.conf
# Tor configuration
nano src/anonymity/multitor/tor_9000/torrc
# Privoxy configuration
sudo nano /opt/homebrew/etc/privoxy/config
List installed plugins:
python src/anonsuite.py --list-plugins
python src/anonsuite.py --run-plugin "Network Info Plugin"
Create a new plugin file in the plugins/
directory:
#!/usr/bin/env python3
"""
Custom AnonSuite Plugin
"""
import sys
import os
sys.path.insert(0, os.path.join(os.path.dirname(os.path.dirname(__file__)), 'src'))
from anonsuite import AnonSuitePlugin
class CustomPlugin(AnonSuitePlugin):
def __init__(self, cli_instance):
super().__init__(cli_instance)
self.name = "Custom Plugin"
self.version = "1.0.0"
self.description = "My custom plugin"
def run(self, *args, **kwargs):
print(f"Running {self.name}...")
# Plugin functionality here
return {"status": "success", "message": "Plugin executed"}
# Version information
python src/anonsuite.py --version
# Help and usage
python src/anonsuite.py --help
# Health check
python src/anonsuite.py --health-check
# Start/stop anonymity services
python src/anonsuite.py --start-anonymity
python src/anonsuite.py --stop-anonymity
# Check status and request new circuit
python src/anonsuite.py --anonymity-status
python src/anonsuite.py --new-circuit
# Network scanning
python src/anonsuite.py --wifi-scan
python src/anonsuite.py --wifi-scan --wifi-interface wlan0
# Rogue AP operations
python src/anonsuite.py --start-ap "TestAP"
python src/anonsuite.py --stop-ap
# WPS attacks
python src/anonsuite.py --wps-attack 00:11:22:33:44:55
# Profile management
python src/anonsuite.py --list-profiles
python src/anonsuite.py --create-profile test
python src/anonsuite.py --profile test
# Import/export
python src/anonsuite.py --export-profile default backup.json
python src/anonsuite.py --import-profile restored backup.json
# Save output to file
python src/anonsuite.py --wifi-scan --output results.json
# Different output formats
python src/anonsuite.py --wifi-scan --format json
python src/anonsuite.py --wifi-scan --format csv
python src/anonsuite.py --wifi-scan --format text
# Disable colors
python src/anonsuite.py --no-color
Edit Tor configuration for advanced settings:
nano src/anonymity/multitor/tor_9000/torrc
Advanced options:
# Exit node country selection
ExitNodes {us},{de},{nl}
StrictNodes 1
# Bridge configuration
UseBridges 1
Bridge obfs4 [bridge_address]
# Hidden service
HiddenServiceDir /path/to/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
Run multiple Tor instances for circuit isolation:
# Start additional Tor instance
./src/anonymity/multitor/multitor --socks-port 9002 --control-port 9003
Implement custom WiFi attack scripts:
from wifi.wifi_scanner import WiFiScanner
from wifi.pixiewps_wrapper import PixiewpsWrapper
# Custom attack workflow
scanner = WiFiScanner()
networks = scanner.scan_networks()
# Filter for WPS-enabled networks
wps_networks = [n for n in networks if 'WPS' in n.get('encryption', '')]
# Automated attack on multiple targets
for network in wps_networks:
# Implement custom attack logic
pass
Create automation scripts for common tasks:
#!/bin/bash
# automated_scan.sh
# Start anonymity services
python src/anonsuite.py --start-anonymity
# Wait for services to start
sleep 10
# Perform WiFi scan
python src/anonsuite.py --wifi-scan --output "scan_$(date +%Y%m%d_%H%M%S).json"
# Stop services
python src/anonsuite.py --stop-anonymity
Integrate AnonSuite with external tools:
# Example: Integration with Nmap
import subprocess
import json
# Get scan results from AnonSuite
result = subprocess.run([
'python', 'src/anonsuite.py', '--wifi-scan', '--format', 'json'
], capture_output=True, text=True)
networks = json.loads(result.stdout)
# Use results with Nmap
for network in networks:
if network['encryption'] == 'Open':
# Scan open networks with Nmap
subprocess.run(['nmap', '-sn', f"{network['gateway']}/24"])
Need Help? Check the Troubleshooting Guide or visit our GitHub Discussions.