Post Exploitation tool that identifies user agents that can bypass proxy restrictions. Equipped with a comprehensive set of options, it allows to test different user agents under various conditions, such as browser type and platform.
By leveraging this tool, you can pinpoint specific user agents that can elude certain proxy server restrictions. Furthermore, the tool provides verbose outputs, batch processing capabilities, and options to test against specific target domains.
Additionally, this repository contains a predefined list of user agents from Useragent-Fuzz-lib repository which can be used right out of the box, but the tool also supports custom user agent files.
🎯 Primary:
- Identify user agents that can bypass proxy restrictions.
- Batch processing capabilities to test multiple user agents simultaneously.
- Flexibility to test against custom target domains.
- Support for both standard and special options to cater to different use cases.
🚀 Secondary:
- Listing of available browser groups for better user agent selection.
- Support for unique browser groups to ensure diverse testing.
- Options to specify user agents by ID, allowing for targeted testing.
- Capability to use a specific user agent string for pinpointed testing.
Rust and PowerShell are pending... Check the milestone here.
-
Installation: Clone this repository to your local machine.
-
Setup: Install the required libraries using the following command:
pip3 install -r requirements.txt
-
Run the Script: Open a terminal and navigate to the project directory. Run the script using help command to familarise with options:
> python3 proxy_bypass.py -h @@@@@@@@@@@ @@@@@@@@@@@@@@@@@ @@@ @@@@@@@@@@@@@@@@@@@@@ @@@@ @@@@@@@@@@ @@@ @@ @@@@@@@@ @@@@ @@@@@@@@ @@@@@@@@ @@@@@@@@@@@@@@@@@@@@ @@@@@@@ @@@@@@@@@@@@@@@@@@@@@ @@@@@@@ @@@@@@@@@@@@@@@@@@ @@@@@@@ @@@@@@@ @@@@@@@@ @@@@@@ @@@@@@@@@ @@@@@@ @@@@@@@@@@@@@@@@ @@@@@@ @@@@@@@@@@@@@ @@@@@@ @@@@@@@ PROXY BYPASS with USERAGENTS Version: 1.0 Description: Command-line tool to identify useragents that bypasses proxy restrictions Report issues at: https://github.com/Add3r/Proxy_Bypass/issues Author: Karthick Siva usage: proxy_bypass.py [-h] [-v] [-r RATE] [-t TIME_INTERVAL] [-p PROXY_DETAILS] [-T TARGET] [-O OUTPUT] [-l] [-B BROWSER [BROWSER ...]] [-P {mobile,general,all}] [-s SPECIFIC_IDS] [-ua USERAGENT] [-uf USERAGENT_FILE] [-uq] Examples: python3 proxy_bypass.py, python3 proxy_bypass.py -B Firefox Chrome, python3 proxy_bypass.py -P mobile options: -h, --help show this help message and exit -v, --verbose print verbose output -r RATE, --rate RATE number of user agents to be processed in each batch -t TIME_INTERVAL, --time-interval TIME_INTERVAL time interval (in seconds) for each batch to be processed -p PROXY_DETAILS, --proxy-details PROXY_DETAILS proxy server details (default: 127.0.0.1:8080) -T TARGET, --target TARGET target domain to test user agents (default: www.google.com) -O OUTPUT, --output OUTPUT output file to write results, -O output.txt Special Options: -l, --list list available browser groups, proxy_bypass.py -l -B BROWSER [BROWSER ...], --Browser BROWSER [BROWSER ...] select user agent browser groups -P {mobile,general,all}, --Platform {mobile,general,all} select user agent platform (mobile/general/all) -s SPECIFIC_IDS, --specific-ids SPECIFIC_IDS run specific user agents by ID (comma-separated) by using ua-id from json file. -ua 'ua-30','ua-31' -ua USERAGENT, --useragent USERAGENT specific user agent string for testing -uf USERAGENT_FILE, --useragent-file USERAGENT_FILE file containing user agents to be tested -uq, --uniq test user agents of unique browser groups
If you encounter any issues or have questions, feel free to open an issue in this repository.
This project is licensed under the GPL 3.0 License - see the LICENSE file for details.