Skip to content

👻 Cyber Threat Intelligence suite for creating a list of working proxies that obtains, validates, and checks proxy origins. Supports VMESS, HTTPS, and SOCKS.

License

Notifications You must be signed in to change notification settings

krystianbajno/check_proxy.py

Repository files navigation

check_proxy.py

CodeFactor Codacy Badge FOSSA Status FOSSA Status

A fast Cyber Threat Intelligence suite for creating a list of working proxies, that obtains, validates, and checks proxy origins. Easily creates IoC proxy lists. Supports vmess, HTTPS, and SOCKS.

       _               _                                                
      | |             | |                                               
   ___| |__   ___  ___| | __    _ __  _ __ _____  ___   _   _ __  _   _ 
  / __| '_ \ / _ \/ __| |/ /   | '_ \| '__/ _ \ \/ / | | | | '_ \| | | |
 | (__| | | |  __/ (__|   <    | |_) | | | (_) >  <| |_| |_| |_) | |_| |
  \___|_| |_|\___|\___|_|\_\   | .__/|_|  \___/_/\_\\__, (_) .__/ \__, |
                         ______| |                   __/ | | |     __/ |
                        |______|_|                  |___/  |_|    |___/ 

                                                       Krystian Bajno 2018
Contributors:                                                      v2 2024
@Artideusz (https://github.com/Artideusz)
   
usage: run_check_proxy.py [-h] [--socks-only] input_file output_file [num_threads]
run_check_proxy.py: error: the following arguments are required: input_file, output_file

Validate proxies in seconds.

The check_proxy.py script supports the following proxy formats in the input file:

vmess://base64-encoded-config
socks4://ip:port
socks5://ip:port
http://ip:port
https://ip:port
ip:port

Usage:

To obtain proxies, run the following command in your terminal:

This command retrieves proxies from the providers listed in the proxy-providers.txt file.

bash get_proxy.sh

To validate the proxies, use the following command:

python run_check_proxy.py <input-file> <output-file> <number-of-threads>

The script generates several reports:

  • output-file: A plain text file containing the proxies connection strings.
  • output-file_details: - An extended report with information on proxy geo-location, integrity, IP, and port.
  • output-file_details.csv: A CSV report with detailed information, useful for banning IP ranges or reporting threats to the Blue Team.

Additional commands

run_get_ip_info.py

Get IP information about the host. Supports vmess connection strings, IP addresses and hostnames.

python3 run_get_ip_info.py vmess://<base64-encoded-config>

python3 run_get_ip_info.py 77.77.77.77

Example output:

    IP      :: 173.245.58.11
    Country :: United States
    Region  :: California
    City    :: San Francisco
    Zip     :: None
    ISP     :: Cloudflare, Inc.
    Org     :: Cloudflare, Inc.
    Time    :: None
    AS      :: AS13335 Cloudflare, Inc.
    Lat     :: 37.7803
    Lon     ;; -122.39

parse_vmess_config.py

Convert vmess into JSON config and print to stdout

python3 parse_vmess_config.py vmess://<base64-encoded-config>

run_crypto_proxy_providers.py

Encrypt/decrypt proxy providers (proxy-providers.txt) and dataset stored in ./dataset. Utilizes AES-256 GCM and 7zip compression.

Encrypt

python3 run_crypto_proxy_providers.py e

Decrypt

python3 run_crypto_proxy_providers.py d

Installation:

Install the required packages using:

pip install -r requirements.txt

License

FOSSA Status

About

👻 Cyber Threat Intelligence suite for creating a list of working proxies that obtains, validates, and checks proxy origins. Supports VMESS, HTTPS, and SOCKS.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •