Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Proxychains for Windows v0.6.8 releases

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      Proxychains.exe – Proxychains for Windows

      Proxychains.exe is a proxifier for Win32(Windows) or Cygwin/Msys2 programs. It hijacks most of the Win32 or Cygwin programs’ TCP connection, making them through one or more SOCKS5 proxy(ies).

      Proxychains.exe hooks network-related Ws2_32.dll Winsock functions in dynamically linked programs via injecting a DLL and redirects the connections through SOCKS5 proxy(ies).

      Proxychains.exe is a port or rewrite of proxychains4 or proxychains-ng to Win32 and Cygwin. It also uses uthash for some data structures and minhook for API hooking.

      Proxychains.exe is tested on Windows 10 x64 1909 (18363.418), Windows 7 x64 SP1, Windows XP x86 SP3, and Cygwin 64-bit 3.1.2. Target OS should have Visual C++ Redistributable for Visual Studio 2015 installed.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Docker for pentest is an image with the more used tools to create a pentest environment easily and quickly.Docker for pentest
          Features
              OS, networking, developing and pentesting tools installed.
              Connection to HTB (Hack the Box) vpn to access HTB machines.
              Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
              Proxy service to send traffic from any browsers and burp suite installed in your local directory.
              Exploit database installed.
              Tool for cracking password.
              Linux enumeration tools installed.
              Tools installed to discovery services running.
              Tools installed to directory fuzzing.
              Monitor for linux processes without root permissions
              Zsh shell installed.
          Tools installed
          Operative system tools
              rdate
              vim
              zsh
              oh-my-zsh
              locate
              cifs-utils
              htop
              gotop
          Network tools
              traceroute
              telnet
              net-tools
              iputils-ping
              tcpdump
              openvpn
              whois
              host
              prips
              dig
          Developer tools
              git
              curl
              wget
              ruby
              go
              python
              python-pip
              python3
              python3-pip
              php
              aws-cli
              tojson
              nodejs
          🔪 Pentest tools
          Port scanning
              nmap
              masscan
              ScanPorts created by @s4vitar with some improvements
          🔍 Recon
              Subdomains
                  Amass
                  GoBuster
                  Knock
                  MassDNS
                  Altdns
                  spyse
                  Sublist3r
                  findomain
                  subfinder
                  spiderfoot
                  haktldextract
              Subdomain takeover
                  subjack
                  SubOver
                  tko-subs
              DNS Lookups
                  hakrevdns
              📷 Screenshot
                  gowitness
                  aquatone
              🕸️ Crawler
                  hakrawler
                  Photon
                  gospider
                  gau
                  otxurls
                  waybackurls
              📁 Search directories
                  dirsearch
              Fuzzer
                  wfuzz
                  ffuf
              Web Scanning
                  whatweb
                  wafw00z
                  nikto
                  arjun
                  httprobe
                  striker
                  hakcheckurl
              CMS
                  wpscan
                  joomscan
                  droopescan
                  cmseek
              Search JS
                  LinkFinder
                  getJS
                  subjs
          Wordlist
              cewl
              wordlists:
                  wfuzz
                  SecList
                  Fuzzdb
                  Dirbuster
                  Dirb
                  Rockyou
                  all.txt
              crunch
          Git repositories
              gitleaks
              gitrob
              gitGraber
              github-search
              GitTools
          OWASP
              sqlmap
              XSStrike
              kxss
              dalfox
          Brute force
              crowbar
              hydra
              patator
              medusa
          Cracking
              hashid
              john the ripper
              hashcat
          OS Enumeration
              htbenum
              linux-smart-enumeration
              linenum
              enum4linux
              ldapdomaindump
              PEASS – Privilege Escalation Awesome Scripts SUITE
              Windows Exploit Suggester – Next Generation
              smbmap
              pspy – unprivileged Linux process snooping
              smbclient
              ftp
          Exploits
              searchsploit
              Metasploit
              MS17-010
              AutoBlue-MS17-010
              PrivExchange
          Windows
              evil-winrm
              impacket
              CrackMapExec
              Nishang
              Juicy Potato
              PowerSploit
              pass-the-hash
              mimikatz
              gpp-decrypt
          Reverse shell
              netcat
              rlwrap
          Other resources
              pentest-tools from @gwen001
              qsreplace from @tomnomnom
          Custom functions
              NmapExtractPorts from @s4vitar
          Other services
              apache2
              squid

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Trishul
          Trishul is an automated vulnerability finding Burp Extension. Built with Jython supports real-time vulnerability detection in multiple requests with user-friendly output. This tool was made to supplement testing where results have to be found in a limited amount of time. Currently, the tool supports finding Cross-Site Scripting, SQL Injections, and Server-Side Template Injections. More vulnerabilities would be added in the later versions.
          Configurations
          There are a couple of configurations available for a user to use Trishul. To view these configurations, head over to Trishul and view the config tab in the bottom left of the pane. Here is the List of Options Available:
              Intercept Button: With Intercept Button set to On, the tool will perform a test on all requests flowing to the website added in Scope. This button is restricted to scope as it is not feasible to test all the requests flowing to Burp from multiple domains. This would affect the performance.
              Auto-Scroll: With Auto-Scroll checked, the tool will scroll automatically to the last tested request. This option is feasible when testing a huge domain with Intercept turned on such that scrolling shouldn’t be a tough job.
              Detect XSS, SQLi, SSTI – These checkboxes are added if any user wants to only test for a specific vulnerability and want to omit other test cases. Used to obtain much faster results for a specific request.
              Blind XSS: This textbox is added for users who want to append their Blind XSS Payload for every parameter in a request. To use this, enter your Blind XSS payload (singular) in the text box and click on the Blind XSS Checkbox. Now, for every request passing through Trishul, the value of all parameters in the request would be replaced with the Blind XSS payload.
          Interpreting Results
          For every result, Trishul displays one of the three options for each of the vulnerability tested:
              Found: The vulnerability was successfully detected for the Request parameters.
              Not Found: The vulnerability was not present in the Request parameters.
              Possible! Check Manually: The vulnerability may be present. The tester has to reconfirm the finding.
          The test for these vulnerabilities depends on the parameters in the request. If the request has no parameters, Trishul would not process this request and would show Not Found in all of the vulnerabilities.
          If any of the Found/Possible! Check Manually is been seen under the vulnerability class for the specific request, the user has to click the result to see the vulnerable parameter displayed under the Vulnerability class in Issues Tab in the bottom left.
          The user then has to select the parameter displayed under the Vulnerability class and the description for that parameter would be shown to him. The user can then view the Request and Response which was sent from Trishul to determine the vulnerability.
          On Clicking the Highlighted Response Tab, you will be shown the highlighted text for some of the vulnerability class. For Example Payload reflection for Cross-Site Scripting or Error Based SQLi text shown in response. The Highlighted Response tab was added as there was no option in Burp API to highlight the response text in Burp’s MessageEditor Tab.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Hackingtool Menu
           
              AnonSurf
              Information Gathering
              Password Attack
              Wireless Attack
              SQL Injection Tools
              Phishing Attack
              Web Attack Tool
              Post exploitation
              Forensic Tools
              Payload Creator
              Router Exploit
              Wifi Jamming
              SocialMedia Attack
              SocialMedia Finder
              Android Hack
              Steganography
              Other Tools
              Update System
          AnonSurf
              Anonmously Surf
              Multitor
          Information Gathering
              Nmap
              Dracnmap
              Port Scanning
              Host To IP
              Xerosploit
              Advanced XSS Detection Suite
              ReconSpider
          Password Attack
              Cupp
              WordlistCreator
              Goblin WordGenerator
              Credential reuse attacks
          Wireless Attack
              WiFi-Pumpkin
              pixiewps
              Bluetooth Honeypot GUI Framework
              Fluxion
              Wifiphisher
              Wifite
              EvilTwin
          SQL Injection Tools
              sqlmap tool
          Phishing Attack
              Setoolkit
              SocialFish
              Shellphish
              BlackEye
              I-See_You(Get Location using phishing attack)
              SayCheese (Grab target's Webcam Shots)
              QR Code Jacking
          Web Attack
              SlowLoris
              Skipfish
              SubDomain Finder
              CheckURL
              Blazy
          Post Explotation
              Vegile - Ghost In The Shell
              Chrome Keylogger
          Forensic Tool
              Bulk_extractor
              Disk Clone and ISO Image Aquire
              AutoSpy
          Payload Generator
              The FatRat*
              Brutal
              Stitch
              MSFvenom Payload Creator
              Venom Shellcode Generator
              Spycam
          Router Exploitation
              RouterSploit
              Fastssh
          SocialMedia Attack
              Instagram Attack
              Tweeter Attack
              Facebook Attack
              Application Checker
          SocialMedia Finder
              Find SocialMedia By Facial Recognation System
              Find SocialMedia By UserName
          Android HAcking
              Keydroid
              MySMS
              Getdroid
              DroidFiles (Get files from Android Directories)
              Lockphish (Grab target LOCK PIN)
              Whatsapp Attack
              DroidCam (Capture Image)
              EvilApp (Hijack Session)
          Steganography
              SteganoHide
              StegnoCracker
              Whitespace
          Ddos Attack tool
              SlowLoris
              SYN Flood DDoS Weapon
              UFOnet
              GoldenEye
          XSS Attack tool
              DalFox(Finder of XSS)
              XSS Payload Generator
              Extended XSS Searcher and Finder
              XSS-Freak
              XSpear
              XSSCon
              XanXSS

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Advanced Phishing Tool For Instagram, With Custom Templates Built According To Your Needs.
          Author:[Whit3H4tJr]
          Features:
              Port Forwarding with Ngrok     Live Attack     IP Grabber     Location Capture
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Telegram Chat by Elfsight is the fastest way for people to address you and get their questions answered. You will stay available online in one the most well-used chat 24/7. Integrate Telegram Chat on your website and it can only be active on selected pages or for certain categories of audience, define chat initiating starters, compose your own welcome text, select icons and other features. Using Telegram Chat active you will stay reachable for people anytime and in any location.
          Demo:

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.