Skip to content

Commit db852b5

Browse files
updated README.md with links to proxy servers
1 parent c134773 commit db852b5

File tree

1 file changed

+24
-3
lines changed

1 file changed

+24
-3
lines changed

README.md

Lines changed: 24 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
1-
# GoHPTS - HTTP(S) proxy to SOCKS5 proxy (chain) written in Go
1+
# GoHPTS - HTTP(S) and TCP/UDP transparent proxy to SOCKS5 proxy (chain) written in Go
22

33
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
44
[![Go Reference](https://pkg.go.dev/badge/github.com/shadowy-pycoder/go-http-proxy-to-socks.svg)](https://pkg.go.dev/github.com/shadowy-pycoder/go-http-proxy-to-socks)
55
![GitHub go.mod Go version](https://img.shields.io/github/go-mod/go-version/shadowy-pycoder/go-http-proxy-to-socks)
66
[![Go Report Card](https://goreportcard.com/badge/github.com/shadowy-pycoder/go-http-proxy-to-socks)](https://goreportcard.com/report/github.com/shadowy-pycoder/go-http-proxy-to-socks)
77
![GitHub Release](https://img.shields.io/github/v/release/shadowy-pycoder/go-http-proxy-to-socks)
88
![GitHub Downloads (all assets, all releases)](https://img.shields.io/github/downloads/shadowy-pycoder/go-http-proxy-to-socks/total)
9+
![GitHub Downloads (all assets, latest release)](https://img.shields.io/github/downloads/shadowy-pycoder/go-http-proxy-to-socks/latest/total)
910

1011
<p align="center"><img alt="MrGopher" src="resources/mr_gopher_small.png"/>
1112

@@ -20,8 +21,8 @@
2021
- [Transparent proxy](#transparent-proxy)
2122
- [redirect (via NAT and SO_ORIGINAL_DST)](#redirect-via-nat-and-so_original_dst)
2223
- [tproxy (via MANGLE and IP_TRANSPARENT)](#tproxy-via-mangle-and-ip_transparent)
23-
- [UDP support](#udp-support)
2424
- [ARP spoofing](#arp-spoofing)
25+
- [UDP support](#udp-support)
2526
- [Traffic sniffing](#traffic-sniffing)
2627
- [JSON format](#json-format)
2728
- [Colored format](#colored-format)
@@ -385,6 +386,8 @@ iptables -t nat -X GOHPTS
385386
386387
### Auto configuration for `redirect` mode
387388
389+
[[Back]](#table-of-contents)
390+
388391
To configure your system automatically, run the following command:
389392
390393
```shell
@@ -456,6 +459,8 @@ ip link del veth1
456459
457460
### Auto configuration for `tproxy` mode
458461
462+
[[Back]](#table-of-contents)
463+
459464
To configure your system automatically, run the following command (for example, on a separate VM):
460465
461466
```shell
@@ -494,6 +499,8 @@ fi
494499
495500
### ARP spoofing
496501
502+
[[Back]](#table-of-contents)
503+
497504
`GoHPTS` has in-built ARP spoofer that can be used to make all TCP talking devices of your LAN to use proxy server to connect to the Internet.
498505
This is achieved by adding `-arpspoof` flag with couple of parameters, separated by semicolon.
499506
@@ -528,6 +535,8 @@ Check proxy logs for traffic from other devices from your LAN
528535
529536
### UDP support
530537
538+
[[Back]](#table-of-contents)
539+
531540
`GoHPTS` has UDP support that can be enabled in `tproxy` mode. For this setup to work you need to connect to a socks5 server capable of serving UDP connections (`UDP ASSOCIATE`). For example, you can use [https://github.com/wzshiming/socks5](https://github.com/wzshiming/socks5) to deploy UDP capable socks5 server on some remote or local machine. Once you have the server to connect to, run the following command:
532541
533542
```shell
@@ -548,7 +557,7 @@ To test it locally, you can combine UDP transparent proxy with `-arpspoof` flag.
548557
sudo ./gohpts -s <socks5 server> -T 8888 -Tu :8989 -M tproxy -sniff -body -auto -mark 100 -d -arpspoof "targets <your host>;fullduplex true;debug false"
549558
```
550559
551-
4. Check connection on your host machine, the traffic should go through Kali machine.
560+
5. Check connection on your host machine, the traffic should go through Kali machine.
552561
553562
## Traffic sniffing
554563
@@ -690,6 +699,8 @@ gohpts -sniff -snifflog ~/sniff.log -j
690699
691700
### Colored format
692701
702+
[[Back]](#table-of-contents)
703+
693704
![GoHPTS - Colors example](resources/sniffing_color.png)
694705
695706
You can see the example of colored output in the picture above. In this mode, `GoHPTS` tries to highlight import information such as TLS Handshake, HTTP metadata, something that looks line login/passwords or different types of auth and secret tokens. The output is limited comparing to JSON but way easier to read for humans.
@@ -723,6 +734,16 @@ Learn more about transparent proxies by visiting the following links:
723734
- [Simple tproxy example](https://github.com/FarFetchd/simple_tproxy_example)
724735
- [Golang TProxy](https://github.com/KatelynHaworth/go-tproxy)
725736
- [Transparent Proxy Implementation using eBPF and Go](https://medium.com/all-things-ebpf/building-a-transparent-proxy-with-ebpf-50a012237e76)
737+
- [https://github.com/heiher/hev-socks5-tproxy](https://github.com/heiher/hev-socks5-tproxy)
738+
739+
`socks5` proxy with `UDP ASSOCIATE` support:
740+
741+
- [https://github.com/wzshiming/socks5](https://github.com/wzshiming/socks5)
742+
- [https://github.com/things-go/go-socks5](https://github.com/things-go/go-socks5)
743+
- [https://github.com/0990/socks5](https://github.com/0990/socks5)
744+
- [https://github.com/dizda/fast-socks5](https://github.com/dizda/fast-socks5)
745+
- [https://github.com/semigodking/redsocks](https://github.com/semigodking/redsocks)
746+
- [https://github.com/ginuerzh/gost](https://github.com/ginuerzh/gost)
726747
727748
## Contributing
728749

0 commit comments

Comments
 (0)