Waraxe IT Security Portal
Login or Register
December 22, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 171
Members: 0
Total: 171
Full disclosure
CyberDanube Security Research 20241219-0 | Authenticated Remote Code Execution in Ewon Flexy 205
Stored XSS with Filter Bypass - blogenginev3.3.8
[SYSS-2024-085]: Broadcom CA Client Automation - Improper Privilege Management (CWE-269)
[KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities
RansomLordNG - anti-ransomware exploit tool
APPLE-SA-12-11-2024-9 Safari 18.2
APPLE-SA-12-11-2024-8 visionOS 2.2
APPLE-SA-12-11-2024-7 tvOS 18.2
APPLE-SA-12-11-2024-6 watchOS 11.2
APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2
APPLE-SA-12-11-2024-4 macOS Sonoma 14.7.2
APPLE-SA-12-11-2024-3 macOS Sequoia 15.2
APPLE-SA-12-11-2024-2 iPadOS 17.7.3
APPLE-SA-12-11-2024-1 iOS 18.2 and iPadOS 18.2
SEC Consult SA-20241211-0 :: Reflected Cross-Site Scripting in Numerix License Server Administration System Login
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Proxy database -> Proxy Tools for[Scaning/Checking/Cleaning/Manage - proxys] Goto page 1, 2Next
Post new topicReply to topic View previous topic :: View next topic
Proxy Tools for[Scaning/Checking/Cleaning/Manage - proxys]
PostPosted: Wed Sep 29, 2004 3:17 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




Here you will find best tools for proxy scaning,checking,cleaning,managing .


Last edited by g0df4th3r on Wed Sep 29, 2004 3:34 am; edited 1 time in total
View user's profile Send private message Visit poster's website ICQ Number
ProxyHunter v3.1.1
PostPosted: Wed Sep 29, 2004 3:25 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




ProxyHunter v3.1.1 - the best proxy scanner !


Proxy Hunter is one of the best tools for scanning IP Ranges. It supports HTTP and FTP Proxy types. Als also verification. It is relatively easy to set up and the interface is simple to learn.

Download
View user's profile Send private message Visit poster's website ICQ Number
Proxyrama v1.7.4
PostPosted: Wed Sep 29, 2004 3:40 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




Proxyrama is a tool for finding and testing proxy servers. it will test them for anonymity, speed, if it's a gateway proxy, 'connect' support (=chainability), socks 4/5 support and geographical location. furthermore, it can be used as a local proxy server that redirects your traffic through a arbitrarily long chain of anonymous proxies and let's you skip images, multimedia crap, ads, popups etc.

Download
View user's profile Send private message Visit poster's website ICQ Number
Automatic Proxy Leecher
PostPosted: Wed Sep 29, 2004 3:42 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




Automatic Proxy Leecher

What makes this tool different from other Proxy Site Leecher is its option to specify download intervalls. Just include the sites of your choice and press start. It also includes a Proxy Checker option.

download
View user's profile Send private message Visit poster's website ICQ Number
DSNS Network Scanner
PostPosted: Wed Sep 29, 2004 3:46 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




DSNS Network Scanner - great tool for scanning for proxys

DSNS is advanced network scanner for Windows 2000. It uses fast SYN scanning to find open ports and is able to probe the services that are running on that ports. So you can check proxys, scan for SMTP relaying hosts and more.

DSNS is a SYN scanner. It doesn't create a connection to remote computers, but it is sending a connection attempt. By analysing the acknowledgment packet one can see if the port ist open or not without having created a connection. That's why some people call SYN scanning Stealth scanning since most loggers only log complete connections.

It is faster because there's no need to ping the remote machines to determinate if they are active or not. We just send out the connection attempts and waiting for results.

Download
View user's profile Send private message Visit poster's website ICQ Number
No-IP DUC v2.1.5
PostPosted: Sun Oct 03, 2004 1:52 am Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




When configured you can use another ip onlline!!!!

This is the No-IP.com Dynamic DNS update client page. We offer these clients for you to download free of charge. The clients are available for Linux/Unix, MacOS, and Windows.

When configured correctly, the client will check your IP address at a given time interval checking to see if your IP has changed. If your IP address has changed it will notify our dns servers and update the IP corresponding to your No-IP/No-IP+ hostname.

http://members.chello.nl/zosman/ducsetup.exe
View user's profile Send private message Visit poster's website
Steganos Internet Anonym Pro V7.0.5
PostPosted: Sun Oct 03, 2004 1:55 am Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




Anonymous on the Net at the click of a button: Over 100 servers disguise your IP address. You change identity every second.
NEW: Surf safely and in comfort: Deactivates interfering Web sites, stops pop-up windows and ActiveX dialers.
NEW: Map of the world showing your camouflage location. You can track how your proxy server changes, live.
NEW: Direct access to Internet Explorer: Easy to use thanks to the plug in.
NEW: Password-protected list of favorites: So you can keep your favorite Web sites private.
Select any browser: Anonymous Web surfing works with all browsers: Internet Explorer, Netscape, Mozilla...
With ProxyScout™: Use only the best servers - invisibility guaranteed!
Web cam anonymization: Be anonymous in video chats!
Faster: Automatic fast servers!
Very easy to use: Just one click is all it takes!

http://www.steganos.com/software/siapro7int.exe


Code:
serial: 246-040-253-153-049
View user's profile Send private message Visit poster's website
SocksCap v5
PostPosted: Sun Oct 03, 2004 1:57 am Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




SOCKSv5 is an IETF (Internet Engineering Task Force) approved standard (RFC 1928) generic, proxy protocol for TCP/IP-based networking applications. The SOCKS protocol provides a flexible framework for developing secure communications by easily integrating other security technologies.

SOCKS includes two components, the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer, while the SOCKS client is implemented between the application and transport layers. The basic purpose of the protocol is to enable hosts on one side of a SOCKS server to gain access to hosts on the other side of a SOCKS Server, without requiring direct IP-reachability.

http://members.chello.nl/zosman/sc32r236.exe
View user's profile Send private message Visit poster's website
Surfanonymous V1.0.1.0
PostPosted: Sun Oct 03, 2004 2:02 am Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




urfAnonymous is an internet utilities that hide your IP address, thereby saving you from the vulnerabilities concerned with it.


Are you looking for a way to change your IP address ?
Are you looking for Anonymous Web Surfing ?
Are you suffering from Hackers ?
Do you want to increase your Online Privacy ?
Are your IP address blocked by websites ( chat, game servers, messageboard, forum ) ?
Are you looking for FREE Proxy List ?
Do you want to hide your OS & Browser Version ?
Do you want to run Programs (MSN .etc) behind firewalls ?
Do you want to hide your IP while chatting in MIRC, ICQ, MSN, Kazaa...etc ?
If yes, then SurfAnonymous is your way

SurfAnonymous offers you the solution from A to Z, it Includes:

1- Proxy Hunter - Search the net for proxies
2- Proxy Analyzer - Analyze Proxies speed,type,location ..etc
3- Proxy Capture - which force the applications to use proxies even if they do not support it by default.
4- Proxy Pool - where you can manage your proxies and eliminate bad proxies.

SurfAnonymous is fully automated. You don't need to have any knowledge of setting up proxy connections. Just "drag the mouse" over the application you want to change its IP and watch.

http://www.freewebs.com/surfinman/surfanonymous1.0.1.0registered.rar
View user's profile Send private message Visit poster's website
PostPosted: Wed Oct 06, 2004 7:23 pm Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




nice job argentino!

_________________
Hackers by LV
View user's profile Send private message Visit poster's website ICQ Number
Tor: An anonymous Internet communication system
PostPosted: Thu Mar 10, 2005 10:43 pm Reply with quote
LINUX
Moderator
Moderator
Joined: May 24, 2004
Posts: 404
Location: Caiman




i test this sofware really exellent Cool
Code:
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.

Traffic analysis is used every day by companies, governments, and individuals that want to keep track of where people and organizations go and what they do on the Internet. Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how much is sent. For example, online advertising company Doubleclick uses traffic analysis to record what web pages you've visited, and can build a profile of your interests from that. A pharmaceutical company could use traffic analysis to monitor when the research wing of a competitor visits its website, and track what pages or products that interest the competitor. IBM hosts a searchable patent index, and it could keep a list of every query your company makes. A stalker could use traffic analysis to learn whether you're in a certain Internet cafe.

Tor aims to make traffic analysis more difficult by preventing eavesdroppers from finding out where your communications are going online, and by letting you decide whether to identify yourself when you communicate.

Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider installing it and then helping out. You can also learn more about Tor here.

Part of the goal of the Tor project is to deploy a public testbed for experimenting with design trade-offs, to teach us how best to provide privacy online. We welcome research into the security of Tor and related anonymity systems, and want to hear about any vulnerabilities you find.

Tor is an important piece of building more safety, privacy, and anonymity online, but it is not a complete solution. And remember that this is development code?it's not a good idea to rely on the current Tor network if you really need strong anonymity.


Code:
Tor is distributed as Free Software under the 3-clause BSD license.

You can get the latest release from the download directory. It should run on Linux, BSD, OS X, Win32, Solaris, and more


Download http://tor.eff.org/download.html
View user's profile Send private message Visit poster's website
PostPosted: Sat Mar 12, 2005 6:03 am Reply with quote
g0df4th3r
Advanced user
Advanced user
Joined: Sep 22, 2004
Posts: 52
Location: LV




nice found argentino/LINUX!

_________________
Hackers by LV
View user's profile Send private message Visit poster's website ICQ Number
Charon
PostPosted: Sun Mar 13, 2005 6:26 pm Reply with quote
KingOfSka
Advanced user
Advanced user
Joined: Mar 13, 2005
Posts: 61




i think charon is the best Very Happy
take a look at it: http://rhino.deny.de/charon.php
it gaves you many proxy, socks ; test it and gave many infos
View user's profile Send private message Visit poster's website
PostPosted: Wed Jun 01, 2005 6:07 pm Reply with quote
flash
Beginner
Beginner
Joined: Jun 01, 2005
Posts: 4




charon is the best Very Happy
View user's profile Send private message
PostPosted: Thu Dec 28, 2006 11:04 pm Reply with quote
PBF
Beginner
Beginner
Joined: Dec 29, 2006
Posts: 4




You can find a lot free proxy tools and many known and unknown softwares on ProxyBlind page about Free Proxy Tools including Charon, ProxyHunter, ProxyRama, IRC Proxy CHecker etc...
View user's profile Send private message Visit poster's website
Proxy Tools for[Scaning/Checking/Cleaning/Manage - proxys]
www.waraxe.us Forum Index -> Proxy database
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 2
Goto page 1, 2Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds