Kodachi networking binaries combine Tor orchestration, multi-protocol routing, DNS hardening, and IP verification into a unified operational stack that can be used interactively or in scripted security workflows.
5 Core Binaries184 Commands12 Routing Protocols50+ DNS ResolversLeak Detection
Traffic and Routing Layer
Flow
tor-switch and routing-switch control exit paths, balancing, and protocol failover, while ip-fetch validates effective network identity from multiple sources.
dns-switch and dns-leak provide encrypted resolver control and immediate leak diagnostics to confirm that anonymization settings are effective end to end.
44 DNS CommandsDoH + DoT + DNSCryptReal-Time Checks
Documentation Navigation
Navigate the documentation:
Quick Start - Installation guide and getting started
Enterprise-Grade Network and Anonymization Infrastructure
The network tools in Kodachi OS provide comprehensive control over network routing, anonymization, DNS management, and IP operations. These production-ready binaries enable secure and anonymous network communications through multiple protocols, advanced Tor orchestration, and intelligent routing mechanisms.
Core Architecture Principles - Verified
Multi-Protocol Support: 12 routing protocols including VPN, proxies, and Tor
Defense Against Surveillance: Complete traffic anonymization and DNS leak prevention
Intelligent Routing: Automatic failover, load balancing, and protocol optimization
Zero Information Leakage: Multi-source verification and comprehensive leak testing
# Start and configure Torsudotor-switchstart-tor
sudotor-switchcreate-multiple-instances3sudotor-switchset-load-balancing-moderound-robin
# Prefer nftables for torrification; load-balancing is handled by instance/HA settingssudotor-switchtorrify-system-nftables
# Verify anonymizationip-fetchcheck-tor--json
dns-leaktest--json
Multi-Protocol Routing Configuration
# List available protocols with scoresrouting-switchlist-protocols
# Connect through fastest protocolsudorouting-switchauto-select
# Configure specific protocolsudorouting-switchconnectshadowsocks
# Export configurationrouting-switchshowconfigqr
DNS Security Setup
# Pick reputable DNS (randomized)sudodns-switchrandom--typereputable
# Enable DNSCrypt (choose resolver explicitly)sudodns-switchdnscrypt-set--resolvercloudflare
# Test for leaksdns-leaktest--json
# Enable Pi-hole filteringsudodns-switchpihole-enable
Network Testing and Verification
# Complete network checkip-fetchtest-all
# DNS leak testingdns-leakdiscover
dns-leaktestdns-leakreport
# Tor verificationip-fetchcheck-tor--json
sudotor-switchverify-tor-dns-all
Advanced Tor Operations
# Set exit node countrysudotor-switchset-exit-nodeUS
# Exclude certain countriessudotor-switchset-exclude-nodeCN,RU
# Configure HAProxy load balancingsudotor-switchgenerate-haproxy-configroundrobin8118sudotor-switchhaproxy-start
# Set automatic IP rotationsudotor-switchupdate-ip-all-timer600# Every 10 minutes
Performance Metrics
Metric
Value
Description
Total Commands
184
Across all network binaries
Protocol Count
12
Supported routing protocols
DNS Resolvers
50+
Available secure DNS servers
Tor Instances
Unlimited
Concurrent Tor instances
Response Time
< 200ms
For routing operations
Load Balance Modes
7
Different distribution algorithms
Protocol Support Matrix
VPN Protocols
Protocol
Binary
Encryption
Speed
OpenVPN
routing-switch
AES-256
Medium
WireGuard
routing-switch
ChaCha20
Fast
Proxy Protocols
Protocol
Binary
Obfuscation
Use Case
Dante
routing-switch
No
SOCKS5 proxy
Tor
routing-switch
Yes
Anonymization
Shadowsocks
routing-switch
Yes
Censorship bypass
V2Ray
routing-switch
Yes
Advanced routing
Xray-VLESS
routing-switch
Yes
TLS disguise
Xray-VLESS-Reality
routing-switch
Yes
Advanced TLS disguise
Xray-Trojan
routing-switch
Yes
HTTPS camouflage
Xray-VMess
routing-switch
Yes
Encrypted proxy
Mita/Mieru
routing-switch
Yes
Traffic obfuscation
Hysteria2
routing-switch
Yes
UDP optimization
DNS Protocols
Protocol
Binary
Security
Privacy
Standard DNS
dns-switch
None
Low
DNSCrypt
dns-switch
Encrypted
High
DNS-over-TLS
dns-switch
TLS
High
DNS-over-HTTPS
dns-switch
HTTPS
High
Network Security Features
Traffic Analysis Prevention
Feature
Description
Tor Load Balancing
Distribute traffic across instances
Protocol Rotation
Automatic protocol switching
DNS Randomization
Rotate DNS servers
IP Rotation
Timed identity changes
Leak Prevention
Feature
Description
DNS Leak Testing
Continuous monitoring
WebRTC Blocking
Prevent IP leaks
IPv6 Management
Disable when needed
Kill Switch
Network isolation on failure
Connection Security
Feature
Description
Certificate Pinning
TLS verification
Authentication
Secure credential management
Encryption
End-to-end encryption
Obfuscation
Traffic disguising
Integration Points
The network tools integrate with:
Integration Type
Services/Components
Security Services
health-control, online-auth
System Services
logs-hook, permission-guard
Firewall Systems
iptables, nftables, ufw
Network Managers
NetworkManager, systemd-networkd
Proxy Software
HAProxy, redsocks, tun2socks
Troubleshooting
Common Issues
Issue
Solution
Prevention
Tor connection fails
Check firewall, restart service
Monitor logs
DNS leaks detected
Enable kill switch, check config
Regular testing
Routing fails
Verify credentials, check protocol
Use fallback
IP not changing
New circuit, check exit nodes
Timer automation
Diagnostic Commands
# Check Tor statussudotor-switchtor-status-all
sudotor-switchcheck-tor-all
# Test routingrouting-switchstatus
routing-switchtest-protocolopenvpn
sudorouting-switchrecover
# Verify DNSdns-switchstatus
dns-switchhealth--typereputable
# Network connectivityip-fetchtest-all
Security Considerations
Important Security Notice
Network anonymization tools should be used responsibly and in accordance with local laws. These tools are designed for legitimate privacy protection and security testing purposes only.