How to Stay Anonymous Online: A Guide to Hiding Your IP and MAC Address with Anonym8

Laughing in the Face of Online Surveillance with Anonym8

4 min readOct 11, 2023

Welcome to BBX where we Load Your Bytes with crazy stuffs.

Hey there, tech enthusiast! Ever wanted to sneak around the internet without leaving a trace? Well, that’s where Anonym8 steps in! It’s a clever tool that helps you stay hidden while testing out web security.

Imagine it as your very own invisibility cloak online! It uses some techy stuff like IP-tables and the Tor Network to make it happen. So, you can tinker with web security without revealing who you really are.

Get ready for some byte-busting fun here at BBX! We’re all about keeping it simple, safe, and adding a sprinkle of humor along the way!

Key Features of Anonym8:

  1. IP-tables Integration: Anonym8 leverages IP-tables to seamlessly integrate with your Kali Linux operating system.
  2. Tor Proxy Usage: The tool utilizes Tor proxies, adding an extra layer of security to your browsing experience.
  3. Tor Tunneling: Anonym8 establishes a secure connection through the Tor Network, safeguarding your online activities.
  4. Network Redirection: Your network traffic is redirected through IP-tables, further enhancing your anonymity.
  5. User-Friendly Interface: Anonym8 boasts a straightforward interface, reminiscent of Metasploitable 1 and Metasploitable 2, ensuring ease of use.
  6. MAC Address Manipulation: In addition to masking your IP address, Anonym8 can also alter your system’s MAC address for added security.

Installation Steps

Step 1: Cloning the Repository

Begin by opening your Kali Linux terminal and executing the following command:

git clone
cd anonym8

Step 2: Granting Permissions

Next, grant permissions to the tool using the following command:

chmod +x

Step 3: Tool Installation

Complete the installation process by running:


Using Anonym8

Example 1: Changing Your IP Address

To change your IP address and view its status, use the command:

anonym8 status_ip

I am not showing my identity here. My system running on a tor proxy.

Before running this command, take note of your original IP address. After executing the command, you’ll observe a new, anonymized IP address, ensuring your online activities remain private.

And done i landed in Russia..

Example 2: Spoofing Your MAC Address

If you wish to further enhance your security, you can spoof your MAC address. Execute the command:

anonym8 start_mac

Observe how the ‘eth’ identifier changes, and note the alteration in flag values. This simple step adds an extra layer of protection to your online endeavors.

For mac address spoofing you can use one more library named “MACCHANGER” which is pre-installed in some security based disrtos like kali , parrot and arch.

Understanding MAC Addresses

The MAC address, short for Media Access Control address, serves as a unique identifier for devices within a network. It plays a crucial role in the data-link layer of telecommunication protocols, particularly in Ethernet LANs.

One of the most effective applications of changing a MAC address is bypassing data limitations imposed by routers. By altering the MAC address, you can outsmart both the router and the hotspot provider, enabling you to access additional data without restrictions.

Keep the Bytes all readers see you in next post.

BBX signing off.




"Tech enthusiast exploring cybersecurity and networking. Sharing insights through the power of words. Join me in the world of tech and discovery. 📚✍️