|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Proxy Tools for[Scaning/Checking/Cleaning/Manage - proxys] |
|
Posted: Wed Sep 29, 2004 3:17 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
Here you will find best tools for proxy scaning,checking,cleaning,managing . |
|
Last edited by g0df4th3r on Wed Sep 29, 2004 3:34 am; edited 1 time in total |
|
|
|
|
ProxyHunter v3.1.1 |
|
Posted: Wed Sep 29, 2004 3:25 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
ProxyHunter v3.1.1 - the best proxy scanner !
Proxy Hunter is one of the best tools for scanning IP Ranges. It supports HTTP and FTP Proxy types. Als also verification. It is relatively easy to set up and the interface is simple to learn.
Download |
|
|
|
|
|
Proxyrama v1.7.4 |
|
Posted: Wed Sep 29, 2004 3:40 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
Proxyrama is a tool for finding and testing proxy servers. it will test them for anonymity, speed, if it's a gateway proxy, 'connect' support (=chainability), socks 4/5 support and geographical location. furthermore, it can be used as a local proxy server that redirects your traffic through a arbitrarily long chain of anonymous proxies and let's you skip images, multimedia crap, ads, popups etc.
Download |
|
|
|
|
|
Automatic Proxy Leecher |
|
Posted: Wed Sep 29, 2004 3:42 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
Automatic Proxy Leecher
What makes this tool different from other Proxy Site Leecher is its option to specify download intervalls. Just include the sites of your choice and press start. It also includes a Proxy Checker option.
download |
|
|
|
|
|
DSNS Network Scanner |
|
Posted: Wed Sep 29, 2004 3:46 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
DSNS Network Scanner - great tool for scanning for proxys
DSNS is advanced network scanner for Windows 2000. It uses fast SYN scanning to find open ports and is able to probe the services that are running on that ports. So you can check proxys, scan for SMTP relaying hosts and more.
DSNS is a SYN scanner. It doesn't create a connection to remote computers, but it is sending a connection attempt. By analysing the acknowledgment packet one can see if the port ist open or not without having created a connection. That's why some people call SYN scanning Stealth scanning since most loggers only log complete connections.
It is faster because there's no need to ping the remote machines to determinate if they are active or not. We just send out the connection attempts and waiting for results.
Download |
|
|
|
|
|
No-IP DUC v2.1.5 |
|
Posted: Sun Oct 03, 2004 1:52 am |
|
|
LINUX |
Moderator |
|
|
Joined: May 24, 2004 |
Posts: 404 |
Location: Caiman |
|
|
|
|
|
|
When configured you can use another ip onlline!!!!
This is the No-IP.com Dynamic DNS update client page. We offer these clients for you to download free of charge. The clients are available for Linux/Unix, MacOS, and Windows.
When configured correctly, the client will check your IP address at a given time interval checking to see if your IP has changed. If your IP address has changed it will notify our dns servers and update the IP corresponding to your No-IP/No-IP+ hostname.
http://members.chello.nl/zosman/ducsetup.exe |
|
|
|
|
|
Steganos Internet Anonym Pro V7.0.5 |
|
Posted: Sun Oct 03, 2004 1:55 am |
|
|
LINUX |
Moderator |
|
|
Joined: May 24, 2004 |
Posts: 404 |
Location: Caiman |
|
|
|
|
|
|
Anonymous on the Net at the click of a button: Over 100 servers disguise your IP address. You change identity every second.
NEW: Surf safely and in comfort: Deactivates interfering Web sites, stops pop-up windows and ActiveX dialers.
NEW: Map of the world showing your camouflage location. You can track how your proxy server changes, live.
NEW: Direct access to Internet Explorer: Easy to use thanks to the plug in.
NEW: Password-protected list of favorites: So you can keep your favorite Web sites private.
Select any browser: Anonymous Web surfing works with all browsers: Internet Explorer, Netscape, Mozilla...
With ProxyScout™: Use only the best servers - invisibility guaranteed!
Web cam anonymization: Be anonymous in video chats!
Faster: Automatic fast servers!
Very easy to use: Just one click is all it takes!
http://www.steganos.com/software/siapro7int.exe
Code: | serial: 246-040-253-153-049 |
|
|
|
|
|
|
|
SocksCap v5 |
|
Posted: Sun Oct 03, 2004 1:57 am |
|
|
LINUX |
Moderator |
|
|
Joined: May 24, 2004 |
Posts: 404 |
Location: Caiman |
|
|
|
|
|
|
SOCKSv5 is an IETF (Internet Engineering Task Force) approved standard (RFC 1928) generic, proxy protocol for TCP/IP-based networking applications. The SOCKS protocol provides a flexible framework for developing secure communications by easily integrating other security technologies.
SOCKS includes two components, the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer, while the SOCKS client is implemented between the application and transport layers. The basic purpose of the protocol is to enable hosts on one side of a SOCKS server to gain access to hosts on the other side of a SOCKS Server, without requiring direct IP-reachability.
http://members.chello.nl/zosman/sc32r236.exe |
|
|
|
|
|
Surfanonymous V1.0.1.0 |
|
Posted: Sun Oct 03, 2004 2:02 am |
|
|
LINUX |
Moderator |
|
|
Joined: May 24, 2004 |
Posts: 404 |
Location: Caiman |
|
|
|
|
|
|
urfAnonymous is an internet utilities that hide your IP address, thereby saving you from the vulnerabilities concerned with it.
Are you looking for a way to change your IP address ?
Are you looking for Anonymous Web Surfing ?
Are you suffering from Hackers ?
Do you want to increase your Online Privacy ?
Are your IP address blocked by websites ( chat, game servers, messageboard, forum ) ?
Are you looking for FREE Proxy List ?
Do you want to hide your OS & Browser Version ?
Do you want to run Programs (MSN .etc) behind firewalls ?
Do you want to hide your IP while chatting in MIRC, ICQ, MSN, Kazaa...etc ?
If yes, then SurfAnonymous is your way
SurfAnonymous offers you the solution from A to Z, it Includes:
1- Proxy Hunter - Search the net for proxies
2- Proxy Analyzer - Analyze Proxies speed,type,location ..etc
3- Proxy Capture - which force the applications to use proxies even if they do not support it by default.
4- Proxy Pool - where you can manage your proxies and eliminate bad proxies.
SurfAnonymous is fully automated. You don't need to have any knowledge of setting up proxy connections. Just "drag the mouse" over the application you want to change its IP and watch.
http://www.freewebs.com/surfinman/surfanonymous1.0.1.0registered.rar |
|
|
|
|
|
|
|
|
Posted: Wed Oct 06, 2004 7:23 pm |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
|
|
|
|
|
Tor: An anonymous Internet communication system |
|
Posted: Thu Mar 10, 2005 10:43 pm |
|
|
LINUX |
Moderator |
|
|
Joined: May 24, 2004 |
Posts: 404 |
Location: Caiman |
|
|
|
|
|
|
i test this sofware really exellent
Code: | Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
Traffic analysis is used every day by companies, governments, and individuals that want to keep track of where people and organizations go and what they do on the Internet. Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how much is sent. For example, online advertising company Doubleclick uses traffic analysis to record what web pages you've visited, and can build a profile of your interests from that. A pharmaceutical company could use traffic analysis to monitor when the research wing of a competitor visits its website, and track what pages or products that interest the competitor. IBM hosts a searchable patent index, and it could keep a list of every query your company makes. A stalker could use traffic analysis to learn whether you're in a certain Internet cafe.
Tor aims to make traffic analysis more difficult by preventing eavesdroppers from finding out where your communications are going online, and by letting you decide whether to identify yourself when you communicate.
Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider installing it and then helping out. You can also learn more about Tor here.
Part of the goal of the Tor project is to deploy a public testbed for experimenting with design trade-offs, to teach us how best to provide privacy online. We welcome research into the security of Tor and related anonymity systems, and want to hear about any vulnerabilities you find.
Tor is an important piece of building more safety, privacy, and anonymity online, but it is not a complete solution. And remember that this is development code?it's not a good idea to rely on the current Tor network if you really need strong anonymity.
|
Code: | Tor is distributed as Free Software under the 3-clause BSD license.
You can get the latest release from the download directory. It should run on Linux, BSD, OS X, Win32, Solaris, and more
|
Download http://tor.eff.org/download.html |
|
|
|
|
|
|
|
|
Posted: Sat Mar 12, 2005 6:03 am |
|
|
g0df4th3r |
Advanced user |
|
|
Joined: Sep 22, 2004 |
Posts: 52 |
Location: LV |
|
|
|
|
|
|
nice found argentino/LINUX! |
|
|
|
|
|
Charon |
|
Posted: Sun Mar 13, 2005 6:26 pm |
|
|
KingOfSka |
Advanced user |
|
|
Joined: Mar 13, 2005 |
Posts: 61 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Wed Jun 01, 2005 6:07 pm |
|
|
flash |
Beginner |
|
|
Joined: Jun 01, 2005 |
Posts: 4 |
|
|
|
|
|
|
|
charon is the best |
|
|
|
|
Posted: Thu Dec 28, 2006 11:04 pm |
|
|
PBF |
Beginner |
|
|
Joined: Dec 29, 2006 |
Posts: 4 |
|
|
|
|
|
|
|
You can find a lot free proxy tools and many known and unknown softwares on ProxyBlind page about Free Proxy Tools including Charon, ProxyHunter, ProxyRama, IRC Proxy CHecker etc... |
|
|
|
|
www.waraxe.us Forum Index -> Proxy database
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 2
Goto page 1, 2Next
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|