![Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members](https://miro.medium.com/v2/resize:fit:1400/1*QaxxYst-fP0JFnz5shrX7w.png)
Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members
![A socks proxy server that sends each request to a random proxy. Also a web proxy that uses a random user-agent for each request and then forwards it to the socks proxy. : A socks proxy server that sends each request to a random proxy. Also a web proxy that uses a random user-agent for each request and then forwards it to the socks proxy. :](https://external-preview.redd.it/ZSRbjA0yTBQTU6iYIafAgRzS_1ZJ9XRYn-3K0V2-WBk.jpg?width=640&crop=smart&auto=webp&s=3a67e5c4252519b2943e6884900a4a2b9f039dc2)
A socks proxy server that sends each request to a random proxy. Also a web proxy that uses a random user-agent for each request and then forwards it to the socks proxy. :
![Core Impact Agent and Proxychain Tunneling – Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis Core Impact Agent and Proxychain Tunneling – Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis](https://rioasmara.files.wordpress.com/2022/01/7-1.png?w=640)
Core Impact Agent and Proxychain Tunneling – Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
Proxy Windows Tooling via SOCKS. Leveraging SOCKS to proxy tools from a… | by Nick Powers | Posts By SpecterOps Team Members
![5pider on Twitter: "Finally implemented the most requested feature which is socks(4a) proxy support. Now the agent should have enough features for practical use as I have planned to not add any 5pider on Twitter: "Finally implemented the most requested feature which is socks(4a) proxy support. Now the agent should have enough features for practical use as I have planned to not add any](https://pbs.twimg.com/media/FiR0mmmXoAEFr5y.png)