** please NOTE that is COMPLETELY educational **
in a previous question I asked here ( named: python reverse shell 0 ) , I was asking about how do I cover my connection so that if the victim was smart and opened wireshark as example, he won’t be able to know my ip
A comment on this topic suggested using NGROK and another comment suggested using it over TOR. Thus I went to TAILS OS such that I can hide my ip from NGROK servers, here is what did:
0- I tried it directly (Without anything, on windows, with my ip ) to check if I am using it the right way or not, and I was using it right
1- I next went to TAILS, made my adjustments for ngrok(connecting to my accout,…etc) then tried the following :
torify ./ngrok tcp 4000
torify means that the next script,…etc will be directed though TOR ,tcp is the tunnel connection type and 4000 is the port no. My code listens to
2- The problem was that NGROK didn’t connect
In theory, as I thought, NGROK will connect and connection from client will be directed through it to Tor exit node , through nodes , till reaches me
and if I torrified my server, the same but in opposite direction 
IS there anything wrong in my setup, theory or even anything I didn’t took it into considerations?
Thank’s in advance.
 NGROK : https://ngrok.com
 As I mentioned in no.0, I have tested this but away from TOR and tails with my partner in this project, what I am not sure of is the case when using TOR.