Http-proxy-list - A lightweight project that hourly scrapes lots of free-proxy sites, validates if it works, and serves a clean proxy list

Overview

Free HTTP Proxy List 🌍

Hourly Update

It is a lightweight project that hourly scrapes lots of free-proxy sites, validates if it works, and serves a clean proxy list.

Scraper found 3626 proxies at the latest update. Usable proxies are below.

Usage

Click the file format that you want and copy the URL.

File Content Count
data.txt ip_address:port combined (seperated new line) 318
data.json ip, port 318
data-with-geolocation.json ip, port, geolocation 318

Sources

Sample Proxies With Geolocation Info

# Ip Port Country City Internet Service Provider
1 98.12.195.129 443 United States New York Spectrum
2 51.222.40.26 9090 Canada Beauharnois OVH SAS
3 130.185.119.20 3128 Germany Düsseldorf Contabo GmbH
4 34.145.237.227 80 United States Washington Google LLC
5 51.79.173.234 3128 Singapore Singapore OVH SAS
6 176.9.63.62 3128 Germany Falkenstein Hetzner Online GmbH
7 5.35.14.167 40016 Russia Moscow INFOLINE
8 79.170.154.180 8083 Russia Moscow Igor Vladimirovich Gorodkov
9 1.13.165.87 8080 China Haidian Shenzhen Tencent Computer Systems Company Limited
10 183.89.11.211 8080 Thailand Pak Kret Triple T Broadband Public Company Limited
11 187.115.192.227 8081 Brazil Belo Horizonte TELEFÔNICA BRASIL S.A
12 181.48.23.250 8080 Colombia Santiago de Cali Telmex Colombia S.A.
13 110.77.236.178 8080 Thailand Samphanthawong CAT Telecom Public Company Limited
14 203.124.60.109 8080 Pakistan Sialkot COMSATS
15 59.63.108.232 41979 China Beijing Chinanet
16 81.174.37.114 8080 Italy Milan NGI
17 124.70.46.14 3128 China Beijing Huawei Cloud Service data center
18 177.73.112.3 9090 Brazil Natal MGNET INFORMATICA E SERVIÔOS LTDA
19 46.173.214.14 8118 Russia Moscow Garant-Park-Internet LLC
20 188.133.158.51 1256 Russia Moscow Enforta-MSK

Contributing

Contributions are welcome, and they are greatly appreciated! Every little bit helps, and credit will always be given.

Owner
Mert Güvençli
Mert Güvençli
Finite Volume simulation of the Raleigh-Taylor Instability

finitevolume2-python Finite Volume simulation of the Raleigh-Taylor Instability Create Your Own Finite Volume Fluid Simulation (With Python): Part 2 B

Philip Mocz 12 Sep 01, 2022
CSAW 2021 writeups

CSAW 2021 Writeups Challenge Category Solved by The Magic Modbus ics root2thrill Lazy Leaks Forensics root2thrill Poem Collection warm-up root2thrill

7 Oct 06, 2021
A Python Scanner for log4j

log4j-Scanner scanner for log4j cat web-urls.txt | python3 log4j.py ID.burpcollaborator.net web-urls.txt http://127.0.0.1:8080 https://www.google.c

Ihebski 5 Jun 26, 2022
Yet another web fuzzer

yafuzz Yet another web fuzzer Usage This script can run in two modes of operation. Supplying a wordlist -W argument will initiate a multithreaded fuzz

FooBallZ 5 Feb 02, 2022
Dependency injection in python with autoconfiguration

The base is a DynamicContainer to autoconfigure services using the decorators @services for regular services and @command_handler for using command pattern.

Sergio Gómez 2 Jan 17, 2022
SubFind - Subdomain Finder Tools

SubFind (Subdomain Finder Tools) Info Tools Result Of Subdomain Command In Termi

LangMurpY 2 Jan 25, 2022
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.

Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries. The exploit spraying the payload to all possible logged HTTP

258 Jan 02, 2023
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Known issues it will not work outside kali , i will update it

Hossam 867 Dec 22, 2022
python script for hack gmail account using brute force attack

#Creator: johnry #coded by john ry GBrute python script for hack gmail account using brute force attack Commands apt update && apt upgrade git clone h

6 Dec 09, 2022
Repository for a project of the course EP2520 Building Networked Systems Security

EP2520_ACME_Project Repository for a project of the course EP2520 Building Networked Systems Security in Royal Institute of Technology (KTH), Stockhol

1 Dec 11, 2021
Phoenix Framework is an environment for writing, testing and using exploit code.

Phoenix Framework is an environment for writing, testing and using exploit code. 🖼 Screenshots 🎪 Community PwnWiki Forums 🔑 Licen

42 Aug 09, 2022
A DOM-based G-Suite password sprayer and user enumerator

A DOM-based G-Suite password sprayer and user enumerator

Mayk 1 Apr 07, 2022
A hack for writing switch statements with type annotations in Python.

py_annotation_switch A hack for writing switch statements in type annotations for Python. Why should I use this? You most definitely should not use th

6 Oct 17, 2021
Notebooks, slides and dataset of the CorrelAid Machine Learning Winter School

CorrelAid Machine Learning Spring School Welcome to the CorrelAid ML Spring School! In this repository you can find the slides and other files for the

CorrelAid 12 Nov 23, 2022
Bug Alert: a service for alerting security and IT professionals of high-impact and 0day vulnerabilities

Bug Alert Bug Alert is a service for alerting security and IT professionals of h

BugAlert.org 208 Dec 15, 2022
This is a Crypto asset tracker that I built to aid my personal journey in cryptocurrencies.

Wallet Tracker This is a Crypto asset tracker that I built to aid my personal journey in cryptocurrencies. build docker build -t wallet-tracker . run

2 Mar 21, 2022
♻️ Password Generator (PSG) 📚 This plugin is made for more familiarity with Python, but can also be used to create passwords

About Tool This plugin is made for more familiarity with Python, but can also be used to create passwords.

STgazing 2 Jul 23, 2022
Bypass 4xx HTTP response status codes.

Forbidden Bypass 4xx HTTP response status codes. To see all the test cases, check the source code - follow the NOTE comments. Script uses multithreadi

Ivan Šincek 165 Dec 28, 2022
AMC- Automatic Media Access Control [MAC] Address Spoofing Tool

AMC (Automatic Media Access Control [MAC] Address Spoofing tool), helps you to protect your real network hardware identity. Each entered time interval your hardware address was changed automatically.

Dipen Chavan 14 Dec 23, 2022
Monty Hall Problem simulation written in Python.

Monty Hall Problem Simulation monty_hall_sim is a brute-force method of determining the optimal strategy for the Monty Hall Problem. Usage Set boolean

Xavier D 1 Aug 29, 2022