Personally i use Back-box it has the best anonymizing tools compared to Kali Linux but installing the back-box tool in Kali is fairly easy using this tutorial How to install backbox-anonymous in Kali (other linux OS) about Tor ,now a days you can do a computer postmortem and get to the culprit who used tor so tor is not the most secure way to hack if only using it, but with a mix of the anonymizing tool and tor plus use a vpn on your browser and chances of you getting caught are below 10% use open vpn and the security gets better with a price to pay slow connection ,If your going to hack for a living i would recommend back-box plus 100 mb if not 100 mb+ , with high bandwidth you don't get too slow hence not much computer finger prints are registered this means getting in and out very fast and delivering those payloads ,If you too going to hack a computer programming background will be a A plus (Perl and python) this scripting languages are used to write exploits this means your hacking limits are raised basically after doing your(reconnaissance) vulnerability tests you can write your own exploits if they are no exploit related to the attack in Kali.The metasploit or Msfconsole has a way too of clearing your fingerprints after hack this means even if the FBI is deployed to find your ass they will never find you(chances are very low),I really recommend back-box it has ram wiping,the anonymous tool and their tor is a customized version of the Tor project and you can install any Kali tool in back-box in its not installed .
proxychains - a tool that forces any TCP connection made by any given application. to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. proxyresolv - DNS resolving. Used to resolve host names via proxy or TOR.
.
.
Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.