|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Frp||72,062||18||2 days ago||88||July 25, 2023||79||apache-2.0||Go|
|A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.|
|Mitmproxy||32,302||423||50||2 days ago||55||November 02, 2022||303||mit||Python|
|An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.|
|Grpc Gateway||16,048||6,619||11 hours ago||395||July 28, 2023||116||bsd-3-clause||Go|
|gRPC to JSON proxy generator following the gRPC HTTP spec|
|Goproxy||14,300||16 days ago||17||April 09, 2021||118||gpl-3.0||Go|
|🔥 Proxy is a high performance HTTP(S) proxies, SOCKS5 proxies,WEBSOCKET, TCP, UDP proxy server implemented by golang. Now, it supports chain-style proxies,nat forwarding in different lan,TCP/UDP port forwarding, SSH forwarding.Proxy是golang实现的高性能http,https,websocket,tcp,socks5代理服务器,支持内网穿透,链式代理,通讯加密,智能HTTP,SOCKS5代理,黑白名单,限速,限流量,限连接数,跨平台,KCP支持,认证API。|
|A full-featured http proxy for node.js|
|HTTP, HTTP2, HTTPS, Websocket debugging proxy|
|Http Proxy Middleware||10,134||359,536||7,401||17 days ago||79||March 03, 2023||94||mit||TypeScript|
|:zap: The one-liner node.js http-proxy middleware for connect, express, next.js and more|
|Proxychains Ng||8,751||4 months ago||119||gpl-2.0||C|
|proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.|
|Cow||8,204||2 years ago||June 19, 2016||240||bsd-2-clause||Go|
|HTTP proxy written in Go. COW can automatically identify blocked sites and use parent proxies to access.|
|A fully configurable http/https proxy in NodeJS|
ProxyChains is a UNIX program, that hooks network-related libc functions in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD) and redirects the connections through SOCKS4a/5 or HTTP proxies. It supports TCP only (no UDP/ICMP etc).
The way it works is basically a HACK; so it is possible that it doesn't work with your program, especially when it's a script, or starts numerous processes like background daemons or uses dlopen() to load "modules" (bug in glibc dynlinker). It should work with simple compiled (C/C++) dynamically linked programs though.
If your program doesn't work with proxychains, consider using an iptables based solution instead; this is much more robust.
Supported Platforms: Linux, BSD, Mac, Haiku.
*********** ATTENTION ***********
this program can be used to circumvent censorship. doing so can be VERY DANGEROUS in certain countries.
ALWAYS MAKE SURE THAT PROXYCHAINS WORKS AS EXPECTED BEFORE USING IT FOR ANYTHING SERIOUS.
this involves both the program and the proxy that you're going to use.
for example, you can connect to some "what is my ip" service like ifconfig.me to make sure that it's not using your real ip.
ONLY USE PROXYCHAINS IF YOU KNOW WHAT YOU'RE DOING.
THE AUTHORS AND MAINTAINERS OF PROXYCHAINS DO NOT TAKE ANY RESPONSIBILITY FOR ANY ABUSE OR MISUSE OF THIS SOFTWARE AND THE RESULTING CONSEQUENCES.
*** Installation ***
./configure --prefix=/usr --sysconfdir=/etc make [optional] sudo make install [optional] sudo make install-config (installs proxychains.conf)
if you dont install, you can use proxychains from the build directory like this: ./proxychains4 -f src/proxychains.conf telnet google.com 80
When to use it ?
Some cool features:
proxychains looks for config file in following order:
** usually /etc/proxychains.conf
$ proxychains telnet targethost.com
in this example it will run telnet through proxy(or chained proxies) specified by proxychains.conf
$ proxychains -f /etc/proxychains-other.conf telnet targethost2.com
in this example it will use different configuration file then proxychains.conf to connect to targethost2.com host.
$ proxyresolv targethost.com
in this example it will resolve targethost.com through proxy(or chained proxies) specified by proxychains.conf
newer versions of nmap try to determine the network interface to use even if it's not needed (like when doing simple syn scans which use the standard POSIX socket API. this results in errors when proxychains hands out an ip address to a reserved address space. possible workarounds: disable proxy_dns, use a numeric ip, or use nmap's native support for SOCKS proxies.
Mac OS X 10.11 (El Capitan) ships with a new security feature called SIP that prevents hooking of system apps. workarounds are to partially disable SIP by issuing csrutil enable --without debug in recovery mode, or to copy the system binary into the home directory and run it from there. see github issue #78 for details.
the glibc dynlinker has a bug or security feature that inhibits dlopen()ed modules from being subject to the same dlsym hooks as installed for the main program. this mainly affects scripting languages such as perl or python that heavily rely on dlopen() for modules written in C to work. there are unconfirmed reports that it works as root though. musl libc is unaffected from the bug.
#proxychains on irc.libera.chat
bitcoins donations are welcome - please send to this address: 1C9LBpuy56veBqw5N33sZMoZW8mwCw3tPh