Web Proxies

Recommended Web Proxy Software For 2017

Home / Hacker Tools / Top Ten / Web Proxies

What Is This Resource?
Remaining in the shadows is critical if you are a Black Hat Hacker.

In this resource we list certain tools and software that is all designed to hide and obfuscate identity through web proxies.

 

 

Quick Links (Tools Listed In This Resource):

To submit a tool please click here or for further information on the range of hacking tools and software that we list please follow this link.

Last Updated: September 23rd, 2017

Fiddler

Fiddler Resources: Books, Courses & Software



Professional Cybersecurity Courses | Free Training

Fiddler

Tool Category: Web Proxies

Cost of Tool: Free


What is Fiddler?
Fiddler is created for web debugging as well as for proxies. Debug traffic from Windows operating systems. It ensures that the proper headers, cookies and cache directives are transferred between the server and client. It can support any framework, including Java, .NET, Ruby, etc.

Is Fiddler Free?
Yes all versions of this tool are free of charge.

Does Fiddler Work on all Operating Systems?
It only works for Microft Windows operating systems.

What are the Typical Uses for Fiddler?
Fiddler is used for debugging web services and to automate responses. It can also be used to inspect all HTTP/HTTPS traffic, “fiddle” with the incoming or outgoing data and set breakpoints.

Paros Proxy

Paros Proxy Resources: Books, Courses & Software



Professional Cybersecurity Courses | Free Training

Paros Proxy

Tool Category: Web Proxies

Cost of Tool: Free


What is Paros Proxy?
Parox Proxy is a java-based web proxy used for assessing vulnerabilities in web application. This tool supports viewing and editing of HTTP/HTTPS messages to change items such as form fields and cookies. It also has a web traffic recorder, hash calculator, web spider and a scanner for testing common web application attacks such as cross-site scrtipting and SQL injection.

Is Paros Proxy Free?
Paros Proxy is totally free.

Does Paros Proxy Work on all Operating Systems?
Paros Proxy works on Linux, Windows and MAC OS X.

What are the Typical Uses for Paros Proxy?
Paros Proxy is created for users who need to evaluate their web applications’ security. It has the ability to intercept and modify HTTP and HTTPS data between a server and client.

Rat Proxy

Rat Proxy Resources: Books, Courses & Software



Professional Cybersecurity Courses | Free Training

Rat Proxy

Tool Category: Web Proxies

Cost of Tool: Free


What is Rat Proxy?
This tool is a large passive and semi-automated security audit tool. It is optimized for sensitive, accurate detection and automatic annotation of security-relevant design patterns and potential problems based on the observation of existing user-initiated traffic in web 2.0 environments.

Is Rat Proxy Free?
Yes. Its free to use.

Does Rat Proxy Work on all Operating Systems?
Rat Proxy works on Linux, Mac OS X and Windows.

What are the Typical Uses for Rat Proxy?
Typical uses of this tool includes detection and broad classes prioritization of security problems such as script inclusion issues, dyanamic cross-site trust model considerations, insufficient XSRF and XSS defenses, content serving problems and a lot more.

sslstrip

sslstrip Resources: Books, Courses & Software



Professional Cybersecurity Courses | Free Training

sslstrip

Tool Category: Web Proxies

Cost of Tool: Free


What is sslstrip?
sslstrip is created to make HTTP sessions looks like HTTPS sessions. With a known private key, it can convert https links to http or to https. For a secure channel illusion, this tool can also provide a padlock pavicon. Normally, many HTTPS sites are accessed from a redirect on an HTTP page and some people doesn’t notice when their connection is not upgraded.

Is sslstrip Free?
All versions of this tool are free of charge.

Does sslstrip Work on all Operating Systems?
Its works natively on Linux, Windows and MAC OS X operating systems.

What are the Typical Uses for sslstrip?
sslstrip is used to strip attack HTTPS. It can also be used to transparently hijack HTTP traffic on networks.

[continued from top of page]