Search the Community

Showing results for tags 'proxy'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 39 results

  1. This free checker included: 1. Proxy Checker 2. Account Checker 3. Skin Checker 4. Flat modern GUI --------------------------------- The check is fast asf (15-25K CPM) --------------------------------- [HIDE][Hidden Content]]
  2. itsMe?

    Proxy Scraper

    [HIDE][Hidden Content]]
  3. itsMe?

    Proxy Grabber by BARRAcUDA v1.2

    [Hidden Content]
  4. dEEpEst

    Proxy Server

    [Hidden Content]
  5. ProxyBroker is an open source tool that asynchronously finds public proxies from multiple sources and concurrently checks them. Features Finds more than 7000 working proxies from ~50 sources. Support protocols: HTTP(S), SOCKS4/5. Also CONNECT method to ports 80 and 23 (SMTP). Proxies may be filtered by type, anonymity level, response time, country and status in DNSBL. Work as a proxy server that distributes incoming requests to external proxies. With automatic proxy rotation. All proxies are checked to support Cookies and Referer (and POST requests if required). Automatically removes duplicate proxies. Is asynchronous. [HIDE][Hidden Content]]
  6. [HIDE][Hidden Content]]
  7. How to Code a Simple PROXY SCRAPER (in PYTHON) [Hidden Content]
  8. itsMe?

    Proxy Grabber by BARRACUDA v1.1

    [HIDE][Hidden Content]]
  9. [Hidden Content]
  10. Proxy Checker v1.0 by Mega Down Link Faster Checker! [HIDE][Hidden Content]]
  11. [HIDE][Hidden Content]]
  12. dEEpEst

    Proxy Trojan

    [Hidden Content]
  13. itsMe?

    COSMOS PROXY v0.10

    Developer: Kush Hacking Version: 0.10 How to use: Grab Proxy: 1. Start: Cosmos Proxy.exe 2. Click on: Grab Proxy or Click on: Settings to select a other Source. Check Proxy: 1. Click on: Load Proxy 2. Select: Threads 3. Select: Methode (Http/s, Socks 4 or Socks 5) 4. Select: Timeout 5. Click on: START! [HIDE][Hidden Content]]
  14. itsMe?

    Burrgundy's Proxy Checker

    [HIDE][Hidden Content]] Pass:
  15. [HIDE][Hidden Content]]
  16. [HIDE][Hidden Content]]
  17. [Hidden Content]
  18. A simple html program to take screenshots of websites or use it as a screenshot proxy for malicious URLs. Download: (Updated 03/03/2019) [Hidden Content] Virus Scan: [hide][Hidden Content]] Source code: <html> <title>Simple URL Image Proxy</title> <body bgcolor="black"> <center> <br> <h1><font color="white">Simple URL Image Proxy</font></h1> <br> <form action="[Hidden Content]?" target="frame"> <input type="hidden" name="key" value="4ba62b"> <input type="hidden" name="dimension" value="640x480"> <input type="hidden" name="device" value="desktop"> <input type="hidden" name="format" value="jpg"> <input type="hidden" name="cacheLimit" value="1"> <input type="hidden" name="delay" value="0"> <input type="text" name="url" value="" placeholder="ex: [Hidden Content]; <input type="submit" name="submit" value="Visit!"> </form> <iframe name="frame" frameborder="0" height="480" width="640"></iframe> </center> </body> </html>
  19. Download: [HIDE][Hidden Content]] Password:
  20. [Hidden Content]
  21. dEEpEst

    Modlishka Reverse Proxy

    ..Modlishka.. Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased with an aim to: help penetration testers to carry out an effective phishing campaign and reinforce the fact that serious threat can arise from phishing. show current 2FA weaknesses, so adequate security solutions can be created and implemented soon. raise community awareness about modern phishing techniques and strategies. support other open source projects that require a universal reverse proxy. Enjoy 🙂 Features Some of the most important 'Modlishka' features : Support for majority of 2FA authentication schemes (by design). No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically). Full control of "cross" origin TLS traffic flow from your victims browsers (through custom new techniques). Flexible and easily configurable phishing scenarios through configuration options. Pattern based JavaScript payload injection. Striping website from all encryption and security headers (back to 90's MITM style). User credential harvesting (with context based on URL parameter passed identifiers). Can be extended with your ideas through plugins. Stateless design. Can be scaled up easily for an arbitrary number of users - ex. through a DNS load balancer. Web panel with a summary of collected credentials and user session impersonation (beta). Backdoor free ;-). Written in Go. Action "A picture is worth a thousand words": Modlishka in action against an example 2FA (SMS) enabled authentication scheme: [Hidden Content] Note: was chosen here just as a POC. Installation Latest source code version can be fetched from here (zip) or here (tar). Fetch the code with 'go get' : $ go get -u Compile the binary and you are ready to go: $ cd $GOPATH/src/ $ make # ./dist/proxy -h Usage of ./dist/proxy: -cert string base64 encoded TLS certificate -certKey string base64 encoded TLS certificate key -certPool string base64 encoded Certification Authority certificate -config string JSON configuration file. Convenient instead of using command line switches. -credParams string Credential regexp collector with matching groups. Example: base64(username_regex),base64(password_regex) -debug Print debug information -disableSecurity Disable security features like anti-SSRF. Disable at your own risk. -jsRules string Comma separated list of URL patterns and JS base64 encoded payloads that will be injected. -listeningAddress string Listening address (default "") -listeningPort string Listening port (default "443") -log string Local file to which fetched requests will be written (appended) -phishing string Phishing domain to create - Ex.: -plugins string Comma seperated list of enabled plugin names (default "all") -postOnly Log only HTTP POST requests -target string Main target to proxy - Ex.: [Hidden Content] -targetRules string Comma separated list of 'string' patterns and their replacements. -targetRes string Comma separated list of target subdomains that need to pass through the proxy -terminateTriggers string Comma separated list of URLs from target's origin which will trigger session termination -terminateUrl string URL to redirect the client after session termination triggers -tls Enable TLS (default false) -trackingCookie string Name of the HTTP cookie used to track the victim (default "id") -trackingParam string Name of the HTTP parameter used to track the victim (default "id") Usage Check out the wiki page for a more detailed overview of the tool usage. FAQ (Frequently Asked Questions) Blog post License Modlishka was made by Piotr Duszyński (@drk1wi). You can find the license here. Credits Thanks for helping with the code go to Giuseppe Trotta (@Giutro) Disclaimer This tool is made only for educational purposes and can be only used in legitimate penetration tests. Author does not take any responsibility for any actions taken by its users. Downlaod: [HIDE][Hidden Content]]
  22. Modlishka Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. [Hidden Content]
  23. Capture Proxy Support Stable Newbie friendly due to simple GUI [Hidden Content]
  24. itsMe?

    Unfx Proxy to Country

    Unfx Proxy to Country - Tool for split your proxy list from ip:port format to countries build on (Electron/React/Redux). Simple sorting and exporting. Features Remove duplicates Sort your proxy list by countries Simple export in ip : port Automatically checking for updates [HIDE][Hidden Content]]