Search the Community

Showing results for tags 'proxy'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 19 results

  1. dEEpEst

    Modlishka Reverse Proxy

    ..Modlishka.. Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased with an aim to: help penetration testers to carry out an effective phishing campaign and reinforce the fact that serious threat can arise from phishing. show current 2FA weaknesses, so adequate security solutions can be created and implemented soon. raise community awareness about modern phishing techniques and strategies. support other open source projects that require a universal reverse proxy. Enjoy 🙂 Features Some of the most important 'Modlishka' features : Support for majority of 2FA authentication schemes (by design). No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically). Full control of "cross" origin TLS traffic flow from your victims browsers (through custom new techniques). Flexible and easily configurable phishing scenarios through configuration options. Pattern based JavaScript payload injection. Striping website from all encryption and security headers (back to 90's MITM style). User credential harvesting (with context based on URL parameter passed identifiers). Can be extended with your ideas through plugins. Stateless design. Can be scaled up easily for an arbitrary number of users - ex. through a DNS load balancer. Web panel with a summary of collected credentials and user session impersonation (beta). Backdoor free ;-). Written in Go. Action "A picture is worth a thousand words": Modlishka in action against an example 2FA (SMS) enabled authentication scheme: [Hidden Content] Note: was chosen here just as a POC. Installation Latest source code version can be fetched from here (zip) or here (tar). Fetch the code with 'go get' : $ go get -u Compile the binary and you are ready to go: $ cd $GOPATH/src/ $ make # ./dist/proxy -h Usage of ./dist/proxy: -cert string base64 encoded TLS certificate -certKey string base64 encoded TLS certificate key -certPool string base64 encoded Certification Authority certificate -config string JSON configuration file. Convenient instead of using command line switches. -credParams string Credential regexp collector with matching groups. Example: base64(username_regex),base64(password_regex) -debug Print debug information -disableSecurity Disable security features like anti-SSRF. Disable at your own risk. -jsRules string Comma separated list of URL patterns and JS base64 encoded payloads that will be injected. -listeningAddress string Listening address (default "") -listeningPort string Listening port (default "443") -log string Local file to which fetched requests will be written (appended) -phishing string Phishing domain to create - Ex.: -plugins string Comma seperated list of enabled plugin names (default "all") -postOnly Log only HTTP POST requests -target string Main target to proxy - Ex.: [Hidden Content] -targetRules string Comma separated list of 'string' patterns and their replacements. -targetRes string Comma separated list of target subdomains that need to pass through the proxy -terminateTriggers string Comma separated list of URLs from target's origin which will trigger session termination -terminateUrl string URL to redirect the client after session termination triggers -tls Enable TLS (default false) -trackingCookie string Name of the HTTP cookie used to track the victim (default "id") -trackingParam string Name of the HTTP parameter used to track the victim (default "id") Usage Check out the wiki page for a more detailed overview of the tool usage. FAQ (Frequently Asked Questions) Blog post License Modlishka was made by Piotr Duszyński (@drk1wi). You can find the license here. Credits Thanks for helping with the code go to Giuseppe Trotta (@Giutro) Disclaimer This tool is made only for educational purposes and can be only used in legitimate penetration tests. Author does not take any responsibility for any actions taken by its users. Downlaod: [HIDE][Hidden Content]]
  2. Modlishka Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. [Hidden Content]
  3. Capture Proxy Support Stable Newbie friendly due to simple GUI [Hidden Content]
  4. sQuoII

    Unfx Proxy to Country

    Unfx Proxy to Country - Tool for split your proxy list from ip:port format to countries build on (Electron/React/Redux). Simple sorting and exporting. Features Remove duplicates Sort your proxy list by countries Simple export in ip : port Automatically checking for updates [HIDE][Hidden Content]]
  5. sQuoII

    Unfx Proxy Parser v2.0

    Features Parsing from sites with tables Parsing from primitive sites Sorting proxies by countries Deep - Allow to follow links External - Allow to follow third-party domains Retry - Retries crawl/parse if been received bad response Results Saving proxies in ip : port format. NOTE: Double click - select/deselect all countries. [HIDE][Hidden Content]]
  6. sQuoII

    Proxy Grabber by BARRAVUDA v1.0

    HTTP Proxys [HIDE][Hidden Content]] [Hidden Content]
  7. Download: [HIDE][Hidden Content]] Password:
  8. sQuoII

    Unfx Proxy Checker v1.3.2

    Unfx Proxy Checker - Powerful proxy checker with huge features and beautiful design build on (Electron/React/Redux). Easy sorting and filtering by all parameters. Features Support protocols: http, https, socks4, socks5 Data capturing: Extra data All data Retry Multiple judges support: Response validation Swap Blacklists support: Single ips Ips with mask Country checking: city, name Keep-Alive checking Anonymity detection: transparent, anonymous, elite Sort by: ip, port, protocols, anon, country, blacklists, keep-alive, extra, timeout Filter by: port, protocols, anon, country, blacklists, keep-alive, extra, timeout Search by: ip, port Country: city, name Export formats: ip : port protocol :// ip : port Automatically checking for updates [HIDE][Hidden Content]]
  9. sQuoII

    Gather Proxy 9.0 Premium Crack

    Gather Proxy is a lightweight Windows utility designed to help users gather information about proxy servers and socks. Portable tool Since this is a portable program, it is important to mention that it doesn’t leave any traces in the Windows Registry. You can copy it on any USB flash drive or other devices, and take it with you whenever you to need to generate proxy and socks lists on the breeze. Although it comes bundled with many useful functions, it boasts a clean and straightforward layout. ather proxy-related data Gather Proxy gives users the possibility to select the type of data they want to grab, namely proxy server or socks list. The program manages to display the lists by downloading the information from What’s more, you can specify a custom URL from where the tools grabs the information, start or stop the current process, and import a proxy list from a file or paste data from the Clipboard. [Hidden Content] Scan
  10. This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion. View the full article
  11. 1337day-Exploits

    Exploits WebKit JIT Proxy Object Issue

    WebKit JIT int32/double arrays can have proxy objects in the prototype chains. View the full article
  12. PHP Proxy version 3.0.3 suffers from a local file inclusion vulnerability. View the full article
  13. 0x1

    Gather Proxy 9

    Gather Proxy 9 Premium Version Download: [Hidden Content] Password : LeVeL23HackToolS.CoM
  14. @.Root

    Proxy New

    [Hidden Content]
  15. dEEpEst

    Total Proxy Leecher

    Download: [HIDE][Hidden Content]] Password:
  16. dEEpEst


  17. dEEpEst

    tools dEEpEstProxy Grabber v1.0.0

    Download: [hide][Hidden Content]] Password:
  18. Download: [hide][Hidden Content]] Password:
  19. maryam

    HMA Proxy Grabber 2.0

    Download : DOWNLOAD Password : lvl23 Scan Resalt : [Hidden Content] Mirror: [Hidden Content] Password :