• April 28, 2024

Proxify Org

projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP ...

projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP …

Features •
Installation •
Usage •
Running Proxify •
Installing SSL Certificate •
Applications of Proxify •
Join Discord
Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, upstream HTTP/Socks5 proxy.
Additionally a replay utility allows to import the dumped traffic (request/responses with correct domain name) into burp or any other proxy by simply setting the upstream proxy to proxify.
Intercept / Manipulate HTTP/HTTPS & NON-HTTTP traffic
Invisible & Thick clients traffic proxy support
TLS MITM support with client/server certificates
HTTP and SOCKS5 support for upstream proxy
Traffic Match/Filter and Replace DSL support
Full traffic dump to file (request/responses)
Native embedded DNS server
Plugin Support to decode specific protocols (e. g XMPP/SMTP/FTP/SSH/)
Proxify Traffic replay in Burp
Download the ready to run binary or install/build using GO
GO111MODULE=on go get -v
This will display help for the tool. Here are all the switches it supports.
proxify help menu
-addr string
Listen Ip and port (ip:port) (default “127. 0. 1:8888”)
-allow value
Whitelist ip/cidr
-cert-cache-size int
Number of certificates to cache (default 256)
-config string
Directory for storing program information (default “$HOME/”)
-deny value
Blacklist ip/cidr
-dns-addr string
Listen DNS Ip and port (ip:port)
-dns-mapping string
DNS A mapping (eg domain:ip, domain:ip,.. )
-dns-resolver string
-dump-req
Dump requests in separate files
-dump-resp
Dump responses in separate files
–proxy string
Upstream HTTP Proxy (eg proxyip:proxyport
-no-color
No Color (default true)
-output string
Output Folder (default “logs”)
-request-dsl string
Request Filter DSL
-request-match-replace-dsl string
Request Match-Replace DSL
-response-dsl string
Response Filter DSL
-response-match-replace-dsl string
-silent
Silent
-socks5-proxy string
Upstream SOCKS5 Proxy (eg socks5proxyip:proxyport)
-v Verbose
-version
Version
Running Proxify
Runs a HTTP proxy on port 8888
Runs a HTTP proxy on custom port 1111
Proxify with upstream proxy
Runs a HTTP proxy on port 8888 and forward the traffic to burp on port 8080
proxify –proxy Runs a HTTP proxy on port 8888 and forward the traffic to the TOR network
proxify -socks5-proxy socks5127. 1:9050
Dump all the HTTP/HTTPS traffic
Dump all the traffic into separate files with request followed by the response.
As default, proxied request/resposed are stored in the logs folder. Additionally dump-req or dump-resp flag can be used for saving specfic part of the request to the file.
Hostname mapping with Local DNS resolver
Proxify supports embedding DNS resolver to map hostnames to specific addresses and define an upstream dns server for any other domain name
Runs a HTTP proxy on port 8888 using an embedded dns server listening on port 53 and resolving to 192. 168. 1. 1 and all other fqdn are forwarded upstream to 1. 1
proxify -dns-addr “:53″ -dns-mapping ” -dns-resolver “1. 1:53”
This feature is used for example by the replay utility to hijack the connections and simulate responses. It may be useful during internal assessments with private dns servers. Using * as domain name matches all dns requests.
Match/Filter traffic with with DSL language.
If the request or response match the filters the dump is tagged with suffix:
proxify -request-dsl “contains(request, ‘firefox’)” -response-dsl “contains(response, md5(‘test’))”
Match and Replace on the fly
Proxify supports modifying Request and Responses on the fly with DSL language.
proxify -request-match-replace-dsl “replace(request, ‘firefox’, ‘chrome’)” -response-match-replace-dsl “regex(response, ‘^authentication failed$’, ‘authentication ok’)”
Replay all traffic into burp
Replay all the dumped requests/responses into the destination URL () if not specified. For this to work it’s necessary to configure burp to use proxify as upstream proxy, as it will take care to hijack the dns resolutions and simulate the remote server with the dumped request. This allows to have in the burp history exactly all requests/responses as if they were originally sent through it, allowing for example to perform a remote interception on cloud, and merge all results locally within burp.
Installing SSL Certificate
A certificate authority is generated for proxify which is stored in the folder ~/ as default, manually can be specified by -config flag. The generated certificate can be imported by visiting proxify/ in a browser connected to proxify.
Installation steps for the Root Certificate is similar to other proxy tools which includes adding the cert to system trusted root store.
Applications of Proxify
Proxify can be used for multiple places, here are some common example where Proxify comes handy:-
Storing all the burp proxy history logs locally.
proxify –proxy
From burp, set the Upstream Proxy to forward all the traffic back to proxify
User Options > Upstream Proxy > Proxy & Port > 127. 1 & 8888
Now all the request/response history will be stored in logs folder that can be used later for post processing.
Store all your browse history locally.
While you browse the application, you can point the browser to proxify to store all the HTTP request / response to file.
Start proxify on default or any port you wish,
proxify -output chrome-logs
Start Chrome browser in Mac OS,
/Applications/ –ignore-certificate-errors –proxy-server= &
Store all the response of while you fuzz as per you config at run time.
proxify -output ffuf-logs
Run FFuF with proxy pointing to proxify
ffuf -x FFUF_CMD_HERE
Proxify is made with by the projectdiscovery team. Community contributions have made the project what it is. See the file for more details.
Proxify - Wikipedia

Proxify – Wikipedia

Proxify is a partly free, single-serving website[1] that enables users to communicate more anonymously on the Internet. [2] An example of this is to have Proxify use an SSH tunnel, already created and listening in on the localhost.
This can be done using PuTTy to dynamically listen in to the host and redirecting traffic through the tunnel. Proxify is then used to hook applications into using the tunnel without configuring the different applications itself.
Proxify matches its registration information with a WHOIS database, as reassurance. [2] There are three general pre-configured options (max speed, max security, or compatibility) with users able to tweak the settings otherwise. [2]
Although free searches are offered, a message may appear: Proxify is experiencing higher than normal traffic volume. We must restrict access to our free service during peak usage times to ensure the best possible experience for paid subscribers. Please login to your account or signup for immediate access.
Because it uses the HTTPS protocol, it can be considered to be secure to eavesdropping and man-in-the-middle attacks, but it has the disadvantage of requiring the users to connect to particular IP addresses, making it fairly easy to block by almost any firewall.
See also[edit]
Internet censorship circumvention
References[edit]
^ Karp, David (2008). Windows Vista Annoyances. O’Reilly. p. 447. ISBN 0-596-52762-4. Proxify.
^ a b c Lilly, Paul (January 2008). “Surf the Web Anonymously”. Maximum PC. p. 68. Retrieved 2009-04-14.
External links[edit]
Official website
Proxify Button – UD Library, Museums and Press

Proxify Button – UD Library, Museums and Press

Installing the Proxify Button on a browser’s toolbar
There may be a need to reauthenticate via the Web Proxy server. Therefore, it might be more convenient to put the desktop Proxify Button on a web browser’s toolbar. This button can be used at any time to access restricted resources. When viewing a web page that requires use of proxy service, click the Proxify button in the web browser’s toolbar.
To install the proxify button on the desktop:
Make sure that Javascript is enabled in the preferred web browser.
Make sure that the browser’s toolbar is visible and unlocked.
Click and drag the button below onto the web browser’s toolbar:
Proxify
To install a proxify bookmark on an iOS (iPads and iPhones) or Android device:
iOS does not allow the web browser toolbar to be customized as can be done on desktop web browsers. Instead, users of iOS devices can install a proxify bookmark. This bookmark approximates the functionality found on desktop web browsers. Follow these procedures to install a proxify bookmark on your iOS device. This process should also work for Android devices.

Frequently Asked Questions about proxify org

Leave a Reply

Your email address will not be published. Required fields are marked *