Skip to content

Command-line tool to identify useragents that bypasses proxy restrictions

License

Notifications You must be signed in to change notification settings

Add3r/Proxy_Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

User Agent Dictionary Logo

GitHub release (latest by date)

License: GPL-3.0 Python Total User-Agents Assessed

Repository Views Awesome Made with Love Support

Proxy_Bypass

Post Exploitation tool that identifies user agents that can bypass proxy restrictions. Equipped with a comprehensive set of options, it allows to test different user agents under various conditions, such as browser type and platform.

By leveraging this tool, you can pinpoint specific user agents that can elude certain proxy server restrictions. Furthermore, the tool provides verbose outputs, batch processing capabilities, and options to test against specific target domains.

Additionally, this repository contains a predefined list of user agents from Useragent-Fuzz-lib repository which can be used right out of the box, but the tool also supports custom user agent files.

Why ?

To find which user agent bypasses proxy restrictions

Scenario 1

Post Exploitation Scenario 1

Scenario 2

Post Exploitation Scenario 2

Overview

🎯 Primary:

  • Identify user agents that can bypass proxy restrictions.
  • Batch processing capabilities to test multiple user agents simultaneously.
  • Flexibility to test against custom target domains.
  • Support for both standard and special options to cater to different use cases.

🚀 Secondary:

  • Listing of available browser groups for better user agent selection.
  • Support for unique browser groups to ensure diverse testing.
  • Options to specify user agents by ID, allowing for targeted testing.
  • Capability to use a specific user agent string for pinpointed testing.

Usage Example

Description of GIF

Setup Instructions

For Python users

Rust and PowerShell are pending... Check the milestone here.

  1. Installation: Clone this repository to your local machine.

  2. Setup: Install the required libraries using the following command:

    pip3 install -r requirements.txt
  3. Run the Script: Open a terminal and navigate to the project directory. Run the script using help command to familarise with options:

    > python3 proxy_bypass.py -h
    
                         
                                                      @@@@@@@@@@@                   
                                   @@@@@@@@@@@@@@@@@         @@@                    
                                @@@@@@@@@@@@@@@@@@@@@       @@@@                    
                              @@@@@@@@@@        @@@          @@                     
                            @@@@@@@@                    @@@@                        
                           @@@@@@@@                   @@@@@@@@                       
                           @@@@@@@@@@@@@@@@@@@@        @@@@@@@                       
                           @@@@@@@@@@@@@@@@@@@@@       @@@@@@@                       
                           @@@@@@@@@@@@@@@@@@          @@@@@@@                       
                            @@@@@@@                  @@@@@@@@                        
                             @@@@@@                @@@@@@@@@                         
                             @@@@@@       @@@@@@@@@@@@@@@@                           
                             @@@@@@       @@@@@@@@@@@@@                              
                             @@@@@@       @@@@@@@                                    
         
                             PROXY BYPASS with USERAGENTS
             
     Version: 1.0
     Description: Command-line tool to identify useragents that bypasses proxy restrictions
     Report issues at: https://github.com/Add3r/Proxy_Bypass/issues
     Author: Karthick Siva
    
     usage: proxy_bypass.py [-h] [-v] [-r RATE] [-t TIME_INTERVAL] [-p PROXY_DETAILS] [-T TARGET] [-O OUTPUT] [-l] [-B BROWSER [BROWSER ...]] [-P {mobile,general,all}] [-s SPECIFIC_IDS] [-ua USERAGENT] [-uf USERAGENT_FILE] [-uq]
    
     Examples: python3 proxy_bypass.py, python3 proxy_bypass.py -B Firefox Chrome, python3 proxy_bypass.py -P mobile
    
     options:
     -h, --help            show this help message and exit
     -v, --verbose         print verbose output
     -r RATE, --rate RATE  number of user agents to be processed in each batch
     -t TIME_INTERVAL, --time-interval TIME_INTERVAL
                             time interval (in seconds) for each batch to be processed
     -p PROXY_DETAILS, --proxy-details PROXY_DETAILS
                             proxy server details (default: 127.0.0.1:8080)
     -T TARGET, --target TARGET
                             target domain to test user agents (default: www.google.com)
     -O OUTPUT, --output OUTPUT
                             output file to write results, -O output.txt
    
     Special Options:
     -l, --list            list available browser groups, proxy_bypass.py -l
     -B BROWSER [BROWSER ...], --Browser BROWSER [BROWSER ...]
                             select user agent browser groups
     -P {mobile,general,all}, --Platform {mobile,general,all}
                             select user agent platform (mobile/general/all)
     -s SPECIFIC_IDS, --specific-ids SPECIFIC_IDS
                             run specific user agents by ID (comma-separated) by using ua-id from json file. -ua 'ua-30','ua-31'
     -ua USERAGENT, --useragent USERAGENT
                             specific user agent string for testing
     -uf USERAGENT_FILE, --useragent-file USERAGENT_FILE
                             file containing user agents to be tested
     -uq, --uniq           test user agents of unique browser groups
    

Note

If you encounter any issues or have questions, feel free to open an issue in this repository.

License

This project is licensed under the GPL 3.0 License - see the LICENSE file for details.