Skip to content

👻 Cyber Threat Intelligence suite for creating a list of working proxies that obtains, validates, and checks proxy origins. Supports VMESS, HTTPS, and SOCKS.

License

Notifications You must be signed in to change notification settings

krystianbajno/check_proxy.py

Repository files navigation

check_proxy.py

CodeFactor Codacy Badge FOSSA Status FOSSA Status

A fast Cyber Threat Intelligence suite for creating a list of working proxies, that obtains, validates, and checks proxy origins. Easily creates IoC proxy lists. Supports vmess, HTTPS, and SOCKS.

       _               _                                                
      | |             | |                                               
   ___| |__   ___  ___| | __    _ __  _ __ _____  ___   _   _ __  _   _ 
  / __| '_ \ / _ \/ __| |/ /   | '_ \| '__/ _ \ \/ / | | | | '_ \| | | |
 | (__| | | |  __/ (__|   <    | |_) | | | (_) >  <| |_| |_| |_) | |_| |
  \___|_| |_|\___|\___|_|\_\   | .__/|_|  \___/_/\_\\__, (_) .__/ \__, |
                         ______| |                   __/ | | |     __/ |
                        |______|_|                  |___/  |_|    |___/ 

                                                       Krystian Bajno 2018
Contributors:                                                      v2 2024
@Artideusz (https://github.com/Artideusz)
   
usage: run_check_proxy.py [-h] [--socks-only] input_file output_file [num_threads]
run_check_proxy.py: error: the following arguments are required: input_file, output_file

Validate proxies in seconds.

The check_proxy.py script supports the following proxy formats in the input file:

vmess://base64-encoded-config
socks4://ip:port
socks5://ip:port
http://ip:port
https://ip:port
ip:port

Usage:

To obtain proxies, run the following command in your terminal:

This command retrieves proxies from the providers listed in the proxy-providers.txt file.

bash get_proxy.sh

To validate the proxies, use the following command:

python run_check_proxy.py <input-file> <output-file> <number-of-threads>

The script generates several reports:

  • output-file: A plain text file containing the proxies connection strings.
  • output-file_details: - An extended report with information on proxy geo-location, integrity, IP, and port.
  • output-file_details.csv: A CSV report with detailed information, useful for banning IP ranges or reporting threats to the Blue Team.

Additional commands

run_get_ip_info.py

Get IP information about the host. Supports vmess connection strings, IP addresses and hostnames.

python3 run_get_ip_info.py vmess://<base64-encoded-config>

python3 run_get_ip_info.py 77.77.77.77

Example output:

    IP      :: 173.245.58.11
    Country :: United States
    Region  :: California
    City    :: San Francisco
    Zip     :: None
    ISP     :: Cloudflare, Inc.
    Org     :: Cloudflare, Inc.
    Time    :: None
    AS      :: AS13335 Cloudflare, Inc.
    Lat     :: 37.7803
    Lon     ;; -122.39

parse_vmess_config.py

Convert vmess into JSON config and print to stdout

python3 parse_vmess_config.py vmess://<base64-encoded-config>

run_crypto_proxy_providers.py

Encrypt/decrypt proxy providers (proxy-providers.txt) and dataset stored in ./dataset. Utilizes AES-256 GCM and 7zip compression.

Encrypt

python3 run_crypto_proxy_providers.py e

Decrypt

python3 run_crypto_proxy_providers.py d

Installation:

Install the required packages using:

pip install -r requirements.txt

License

FOSSA Status

About

👻 Cyber Threat Intelligence suite for creating a list of working proxies that obtains, validates, and checks proxy origins. Supports VMESS, HTTPS, and SOCKS.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published