Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      sQuoII

      Unfx Proxy Parser v2.0

      1 post in this topic

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Features

      • Parsing from sites with tables
      • Parsing from primitive sites
      • Sorting proxies by countries
      • Deep - Allow to follow links
      • External - Allow to follow third-party domains
      • Retry - Retries crawl/parse if been received bad response

      Results

      Saving proxies in ip : port format.

      NOTE:

      Double click - select/deselect all countries.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          ..Modlishka..
          Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.
          It was realeased with an aim to:
          help penetration testers to carry out an effective phishing campaign and reinforce the fact that serious threat can arise from phishing. show current 2FA weaknesses, so adequate security solutions can be created and implemented soon. raise community awareness about modern phishing techniques and strategies. support other open source projects that require a universal reverse proxy. Enjoy 🙂
          Features
          Some of the most important 'Modlishka' features :
          Support for majority of 2FA authentication schemes (by design). No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically). Full control of "cross" origin TLS traffic flow from your victims browsers (through custom new techniques). Flexible and easily configurable phishing scenarios through configuration options. Pattern based JavaScript payload injection. Striping website from all encryption and security headers (back to 90's MITM style). User credential harvesting (with context based on URL parameter passed identifiers). Can be extended with your ideas through plugins. Stateless design. Can be scaled up easily for an arbitrary number of users - ex. through a DNS load balancer. Web panel with a summary of collected credentials and user session impersonation (beta). Backdoor free ;-). Written in Go. Action
          "A picture is worth a thousand words":
          Modlishka in action against an example 2FA (SMS) enabled authentication scheme:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Note: google.com was chosen here just as a POC.
          Installation
          Latest source code version can be fetched from 
          Hidden Content
          Give reaction to this post to see the hidden content.  (zip) or  Hidden Content
          Give reaction to this post to see the hidden content.  (tar). Fetch the code with 'go get' :
          $ go get -u github.com/drk1wi/Modlishka Compile the binary and you are ready to go:
          $ cd $GOPATH/src/github.com/drk1wi/Modlishka/ $ make
          Hidden Content
          Give reaction to this post to see the hidden content. # ./dist/proxy -h Usage of ./dist/proxy: -cert string base64 encoded TLS certificate -certKey string base64 encoded TLS certificate key -certPool string base64 encoded Certification Authority certificate -config string JSON configuration file. Convenient instead of using command line switches. -credParams string Credential regexp collector with matching groups. Example: base64(username_regex),base64(password_regex) -debug Print debug information -disableSecurity Disable security features like anti-SSRF. Disable at your own risk. -jsRules string Comma separated list of URL patterns and JS base64 encoded payloads that will be injected. -listeningAddress string Listening address (default "127.0.0.1") -listeningPort string Listening port (default "443") -log string Local file to which fetched requests will be written (appended) -phishing string Phishing domain to create - Ex.: target.co -plugins string Comma seperated list of enabled plugin names (default "all") -postOnly Log only HTTP POST requests -target string Main target to proxy - Ex.: https://target.com -targetRules string Comma separated list of 'string' patterns and their replacements. -targetRes string Comma separated list of target subdomains that need to pass through the proxy -terminateTriggers string Comma separated list of URLs from target's origin which will trigger session termination -terminateUrl string URL to redirect the client after session termination triggers -tls Enable TLS (default false) -trackingCookie string Name of the HTTP cookie used to track the victim (default "id") -trackingParam string Name of the HTTP parameter used to track the victim (default "id") Usage
          Check out the  Hidden Content
          Give reaction to this post to see the hidden content.  page for a more detailed overview of the tool usage. Hidden Content
          Give reaction to this post to see the hidden content.  (Frequently Asked Questions) Hidden Content
          Give reaction to this post to see the hidden content. License
          Modlishka was made by Piotr Duszyński (
          Hidden Content
          Give reaction to this post to see the hidden content. ). You can find the license 
          Hidden Content
          Give reaction to this post to see the hidden content. . Credits
          Thanks for helping with the code go to Giuseppe Trotta (
          Hidden Content
          Give reaction to this post to see the hidden content. ) Disclaimer
          This tool is made only for educational purposes and can be only used in legitimate penetration tests. Author does not take any responsibility for any actions taken by its users.
          Downlaod:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 0wner
          Modlishka
          Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By sQuoII

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content. Pass:
          level23hacktools.com
           

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. itsMe?#3494
        • By sQuoII

          Hidden Content
          Give reaction to this post to see the hidden content. Capture
          Proxy Support
          Stable
          Newbie friendly due to simple GUI

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By sQuoII

          Hidden Content
          Give reaction to this post to see the hidden content. Unfx Proxy to Country - Tool for split your proxy list from ip:port format to countries build on (Electron/React/Redux). Simple sorting and exporting.
          Features
          Remove duplicates Sort your proxy list by countries Simple export in ip : port Automatically checking for updates
          Hidden Content
          Give reaction to this post to see the hidden content.