When conducting offensive security activities, it is often beneficial to employ stealth techniques to conceal our identity behind a veil of anonimity.
One such method is leveraging the Tor network to mask the IP address from which we are initiating our actions.
One can, for example, run a container that executes the Tor service and then launching enumeration and discovery tools using that container as a proxy (or running the tools directly from within the container):
FROM alpine:latest
RUN apk update && apk --no-cache add tor curl wget nmap jq # add other tools here
CDM tor