Bypass IP Bans with Deadpool – The Ultimate SOCKS5 Proxy Pool Tool – wiki大全

Bypass IP Bans with Deadpool – The Ultimate SOCKS5 Proxy Pool Tool

Deadpool Logo

In the world of cybersecurity, especially during penetration testing or red teaming engagements, it’s common to encounter situations where your IP address gets blocked by firewalls or other security measures. This can significantly hinder your progress and disrupt your workflow. To overcome this challenge, security professionals often rely on proxy servers to mask their real IP address and bypass these restrictions.

However, finding reliable and high-quality proxy servers can be a daunting task. Free proxy lists are often filled with slow, unreliable, or even malicious servers. Paid proxy services can be expensive, and even then, there’s no guarantee of quality.

This is where Deadpool comes in. Deadpool is a powerful and versatile SOCKS5 proxy pool tool that allows you to create your own private proxy pool from various sources, including popular search engines for internet-connected devices like FOFA, Hunter, and Quake. You can also import your own list of SOCKS5 proxies. Deadpool will then automatically validate these proxies and provide you with a reliable and rotating SOCKS5 proxy service on your local machine.

Features

  • Multiple Proxy Sources: Fetch SOCKS5 proxies from FOFA, Hunter, and Quake.
  • Local Proxy List: Import your own list of SOCKS5 proxies.
  • Proxy Validation: Automatically checks the availability and quality of proxies.
  • Geolocation Filtering: Filter proxies based on their geographical location.
  • Proxy Authentication: Secure your proxy pool with a username and password.
  • Scheduled Tasks: Periodically update your proxy list and check for dead proxies.
  • Easy to Use: Simple configuration and straightforward command-line interface.
  • Cross-Platform: Runs on Windows, macOS, and Linux.

How it Works

Deadpool works by fetching a list of potential SOCKS5 proxy servers from the configured sources. Once the list is retrieved, Deadpool performs a series of checks to validate each proxy. These checks include:

  1. Connectivity Check: Deadpool attempts to connect to the proxy server to ensure that it is online and accepting connections.
  2. Protocol Check: It verifies that the server is a SOCKS5 proxy and supports the “No Authentication” method.
  3. Anonymity Check: Deadpool can be configured to check the proxy’s anonymity level by making a request to a specified URL and checking the response.
  4. Geolocation Check: You can configure Deadpool to include or exclude proxies based on their country.

After the validation process, Deadpool creates a pool of effective proxies and starts a local SOCKS5 proxy server. When you configure your tools to use this local proxy, Deadpool will forward your traffic through one of the proxies from the pool in a round-robin fashion. This ensures that your IP address is constantly changing, making it much harder for your target to block you.

If a proxy becomes unavailable, Deadpool will automatically remove it from the pool and switch to the next available proxy. This ensures that you always have a working connection.

Installation and Configuration

Deadpool is written in Go and can be easily compiled from the source code.

Prerequisites

  • Go 1.23 or higher

Installation

  1. Clone the Deadpool repository:
    git clone https://github.com/thinkoaa/Deadpool.git
  2. Navigate to the Deadpool directory:
    cd Deadpool
  3. Build the executable:
    go build -o Deadpool.exe main.go

Configuration

Deadpool is configured using a TOML file named config.toml. A sample configuration file is provided in the repository. Here’s a breakdown of the configuration options:

“`toml
[listener]

Local listening address and port

IP = ‘127.0.0.1’
PORT = 10086

Optional username and password for authentication

userName = ”
password = ”

[task]

Cron expressions for scheduled tasks

periodicChecking = ‘0 12 * * ‘ # Periodically check the health of proxies
periodicGetSocks = ’30 12 * *
‘ # Periodically fetch new proxies

[checkSocks]

Proxy validation settings

checkURL = ‘https://www.baidu.com/robots.txt’
checkRspKeywords = ‘Baiduspider’
maxConcurrentReq = 200
timeout = 6

[checkSocks.checkGeolocate]

Geolocation filtering settings

switch = ‘close’ # ‘open’ to enable
checkURL = ‘https://qifu-api.baidubce.com/ip/local/geo/v1/district’
excludeKeywords = [‘澳门’,’香港’,’台湾’]
includeKeywords = [‘中国’]

[FOFA]
switch = ‘open’
apiUrl = ‘https://fofa.info/api/v1/search/all’
email = ‘your-fofa-email’
key = ‘your-fofa-key’
queryString = ‘protocol==”socks5″ && country!=”CN” && banner=”Method:No Authentication”‘
resultSize = 500

[QUAKE]
switch = ‘close’
apiUrl = ‘https://quake.360.net/api/v3/search/quake_service’
key = ‘your-quake-key’
queryString = ‘service:socks5 AND country: “CN” AND response:”No authentication”‘
resultSize = 500

[HUNTER]
switch = ‘close’
apiUrl = ‘https://hunter.qianxin.com/openApi/search’
key = ‘your-hunter-key’
queryString = ‘protocol==”socks5″&&protocol.banner=”No authentication”&&ip.country=”CN”‘
resultSize = 200
“`

Before running Deadpool, make sure to replace the placeholder API keys in the config.toml file with your actual keys.

Usage

To start Deadpool, simply run the executable from your terminal:

./Deadpool.exe

Deadpool will then start fetching and validating proxies based on your configuration. Once the process is complete, it will start a local SOCKS5 proxy server on the configured address and port.

Now you can configure your favorite tools to use the Deadpool proxy.

Burp Suite

In Burp Suite, go to User options > Connections > SOCKS Proxy and enter the address and port of the Deadpool proxy.

Burp Suite Configuration

Proxifier

In Proxifier, you can add a new proxy server and specify the address and port of the Deadpool proxy.

Proxifier Configuration

SwitchyOmega

In SwitchyOmega, you can create a new proxy profile and set the protocol to SOCKS5, the server to 127.0.0.1, and the port to 10086.

SwitchyOmega Configuration

Automation with GitHub Actions

The README.md file provides a detailed guide on how to automate the process of collecting and updating your proxy list using GitHub Actions. This allows you to maintain a fresh list of proxies without any manual intervention.

Disclaimer

This tool is intended for legal and authorized security testing purposes only. By using this tool, you agree to comply with all applicable laws and regulations. The author of this tool is not responsible for any illegal or unauthorized use.


With Deadpool, you can easily build your own private SOCKS5 proxy pool and bypass IP bans with ease. Its powerful features and simple configuration make it an essential tool for any security professional.

滚动至顶部