11/12 free views
Dataset
Dataset
Network Security

PROXY-List

by TheSpeedX

5.1Kstars
1.1Kforks
182watchers
Updated 3 months ago
About

PROXY-List is a regularly updated collection of free public proxy servers for easy access and use in network-related tasks.

Get PROXY List that gets updated everyday

Primary Use Case

This tool is primarily used by network security professionals, developers, and researchers who need access to a large, up-to-date list of free proxies for testing, network monitoring, or security automation. It simplifies acquiring proxy lists without manually searching multiple sources. Users can integrate these proxies into their tools or scripts for anonymity, bypassing restrictions, or load balancing.

Key Features
  • Daily updated free public proxy lists
  • Includes SOCKS5, SOCKS4, and HTTP proxy types
  • Easy direct download links for proxy lists
  • Large volume of proxies (over 42,000)
  • Clear disclaimer about proxy ownership and usage
  • Supports educational and ethical use cases
  • Integration recommendation with SOCKER tool for proxy validation

Usage

>_ https://raw.githubusercontent.com/TheSpeedX/SOCKS-List/master/socks5.txt

Download the latest SOCKS5 proxy list

>_ https://raw.githubusercontent.com/TheSpeedX/SOCKS-List/master/socks4.txt

Download the latest SOCKS4 proxy list

>_ https://raw.githubusercontent.com/TheSpeedX/SOCKS-List/master/http.txt

Download the latest HTTP proxy list

Security Frameworks
Reconnaissance
Resource Development
Defense Evasion
Command and Control
Collection
Usage Insights
  • Integrate the proxy list with automated red team tools to simulate adversary network traffic and test detection capabilities.
  • Use the dataset to enrich threat intelligence feeds for anomaly detection in network monitoring systems.
  • Combine with SOCKER or similar proxy validation tools to automate proxy health checks and reduce false positives in detection.
  • Leverage proxies to anonymize penetration testing activities, enhancing stealth during red team engagements.
  • Incorporate proxy rotation in automated security scanning pipelines to avoid IP blocking and improve scan coverage.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about PROXY-List. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team85%
Blue Team30%
Purple Team55%
Details
Open Issues46
Topics
socks
free
proxy
vpn
anonymous
anonymity
socks5-proxy
hacking
proxy-list
free-proxy