PROXYCHAINS
DESCRIPTION
Proxychains acts as a wrapper around any command-line program, allowing it to route its traffic through specified proxies (e.g., SOCKS, HTTP)
It is often used for general-purpose traffic redirection, privacy enhancement, and bypassing network restrictions.
USE CASES
Bypassing Geo-restrictions: Accessing content that may be restricted in certain geographic areas.
Security Testing: Penetration testers can use it to test the security of networks and applications while maintaining anonymity.
Web Scraping: When scraping data from websites, using proxies can help avoid IP bans.
INSTALLATION
CONFIGURATION
TOR W/ PROXYCHAINS
UTILITIES
Nmap
PowerShell Core (Linux)
Evil-WinRM
Last updated