Staying anonymous online is more important than ever. Whether you’re a penetration tester, ethical hacker, or privacy-conscious user, frequently changing your VPN or proxy can help avoid tracking and enhance security.

In this guide, I’ll show you two methods to change your VPN or Proxy every minute on Parrot OS:

  1. Using OpenVPN (With Random Server Switching)
  2. Using ProxyChains + Tor (With Automated Proxy Change)

Method 1: Automatically Change VPN Every Minute (Using OpenVPN)

Using OpenVPN, we can switch between multiple VPN servers randomly every minute.

Step 1: Install OpenVPN

First, install OpenVPN if it’s not already installed:

sudo apt update && sudo apt install openvpn -y

Step 2: Get VPN Configuration Files

You’ll need .ovpn configuration files from a VPN provider. Here are some sources:

Free VPNs:

Save these .ovpn files in /etc/openvpn/servers/.

Step 3: Create a Script to Change VPN Automatically

Now, create a script to switch VPN servers randomly.

sudo nano /usr/local/bin/change_vpn.sh

Paste this script:

#!/bin/bash

# Directory containing VPN configuration files
VPN_DIR="/etc/openvpn/servers/"
LOG_FILE="/var/log/vpn_change.log"

# Get list of VPN config files
VPN_FILES=($VPN_DIR*.ovpn)

while true; do
# Pick a random VPN file
RANDOM_VPN=${VPN_FILES[RANDOM % ${#VPN_FILES[@]}]}

# Kill any existing VPN connection
sudo pkill -f openvpn

# Connect to the new VPN
sudo openvpn --config "$RANDOM_VPN" --daemon

# Log the change
echo "$(date) - Connected to: $RANDOM_VPN" >> $LOG_FILE

# Wait 60 seconds before switching VPN
sleep 60
done

Save and exit (CTRL+X, then Y, then Enter).

Step 4: Make the Script Executable

sudo chmod +x /usr/local/bin/change_vpn.sh

Step 5: Run the VPN Changer in the Background

nohup sudo /usr/local/bin/change_vpn.sh &

This will keep changing VPN servers every minute automatically!

Method 2: Automatically Change Proxy Every Minute (Using ProxyChains + Tor)

If you prefer using ProxyChains instead of VPN, this method will automatically switch your proxy every minute.

Step 1: Install ProxyChains & Tor

sudo apt update && sudo apt install proxychains tor -y

Step 2: Configure ProxyChains

Edit the ProxyChains config fisudo nano /etc/proxychains.conf

🔹 Modify these settings:

strict_chain
# Change to:
dynamic_chain

🔹 Set up Tor as the primary proxy (add this line at the bottom):

socks5  127.0.0.1 9050

Save and exit.

Step 3: Start Tor Service

sudo systemctl start tor
sudo systemctl enable tor # Optional: Start on boot

Step 4: Create an Automated Proxy Rotation Script

sudo nano /usr/local/bin/change_proxy.sh

Paste this script:

#!/bin/bash

# Change Tor IP every minute
while true; do
echo "Changing Proxy..."

# Request a new Tor circuit
echo -e "AUTHENTICATE \"\"\r\nSIGNAL NEWNYM\r\nQUIT" | nc localhost 9051

# Wait 60 seconds before switching again
sleep 60
done

Save and exit.

Step 5: Grant Execution Permission

sudo chmod +x /usr/local/bin/change_proxy.sh

Step 6: Run the Proxy Changer in Background

nohup sudo /usr/local/bin/change_proxy.sh &

Step 7: Use ProxyChains to Browse Anonymously

Now, any application can use ProxyChains to hide your IP!

proxychains firefox

or

proxychains curl ifconfig.me

(Your IP will change every time!)

Which Method is Better? VPN or ProxyChains?

FeatureVPN (OpenVPN)ProxyChains (Tor)
Encryption✅ Strong❌ Weak
Anonymity✅ High✅ High
Speed⚡ Fast🐢 Slow
Best forSecurity & StreamingPrivacy & Hacking

Use OpenVPN if you need fast and encrypted browsing.
Use ProxyChains if you want to route traffic through multiple proxies for anonymity.

Both VPN and ProxyChains offer great ways to stay anonymous online. By using the scripts above, your VPN or Proxy will automatically change every minute, keeping you one step ahead of trackers.

💬Did you find this guide helpful? Let me know in the comments!

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *