proxychains VS frida

Compare proxychains vs frida and see what are their differences.

proxychains

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. (by haad)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
proxychains frida
19 14
6,053 14,733
- 3.0%
7.0 9.2
4 months ago 3 days ago
C Meson
GNU General Public License v3.0 only GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

proxychains

Posts with mentions or reviews of proxychains. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-08.

frida

Posts with mentions or reviews of frida. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-26.
  • Reversing an Android app API
    2 projects | dev.to | 26 Sep 2023
    Frida, uff this is just AMAZING, yes with uppercase and in bold letters. They also has bindings on different languages that can be found in their github repository. Spoiler alert...the Go binding it's pure shit...really couldn't run it. Use just the default that it's installed with pip install frida-tools.
  • Using LD_PRELOAD to cheat, inject features and investigate programs
    6 projects | news.ycombinator.com | 8 Sep 2023
    A great framework for doing something along those lines is Frida (https://github.com/frida/frida). Works on a bunch of stuff, including Android and iOS. Some global-ish certificate pinning bypasses work through Frida, by patching http libraries to not raise exceptions, accept system certificates, etc and just quietly hum along instead. Certificate unpinning in turn enables network MITM with mitmproxy, which makes it a lot quicker and easier to inspect, block, or modify network traffic.

    Funnily enough, I've seen much stronger obfuscation from reverse engineering from my cheap Tuya IoT devices app than from my bank app.

  • iOS Application Security And Static Analysis
    1 project | /r/u_detoxcybersecurity | 19 Jun 2023
    Install Frida from Github :- https://github.com/frida/frida
  • Have you ever heard of apk.sh? It makes reverse engineering Android apps easier.
    2 projects | /r/netsec | 24 Mar 2023
    // see: https://github.com/frida/frida/issues/382
  • Firefox Android now supports tampermonkey
    11 projects | news.ycombinator.com | 16 Feb 2023
    If anyone needs a "monkey" not for web pages but for any process on your computer system, may I recommend Frida:

    https://frida.re

    https://github.com/frida/frida

    With Frida, you write JavaScript programs and inject them into arbitrary processes, to hook and modify and call whatever you please.

    It gets a lot of use in the reverse engineering and vulnerability research communities, but has broader scope too. For instance, I used it recently to automate the UI of a video production program on Windows, by injecting a thread that sends window messages to the main message loop and hooks into various system dialog functions.

  • [Request] Tweak to Decrypt iPAs on Palera1n!
    2 projects | /r/jailbreak | 5 Feb 2023
  • apk.sh, make reverse engineering Android apps easier!
    4 projects | /r/androiddev | 13 Dec 2022
    var android_log_write = new NativeFunction( Module.getExportByName(null, '__android_log_write'), 'int', ['int', 'pointer', 'pointer'] ); var tag = Memory.allocUtf8String("[frida-sript][ax]"); var work = function() { setTimeout(function() { android_log_write(3, tag, Memory.allocUtf8String("ping @ " + Date.now())); work(); }, 1000); } work(); // console.log does not seems to work. see: https://github.com/frida/frida/issues/382 console.log("console.log"); console.error("console.error"); console.warn("WARN"); android_log_write(3, tag, Memory.allocUtf8String(">--(O.o)-<)");
  • How to use Galaxy Watch 4 on "unsupported" Android devices
    1 project | /r/u_mschuster91 | 17 Apr 2022
    Go to https://github.com/frida/frida/releases and download the latest frida-server--android-arm64.xz. Extract it and run adb push frida-server--android-arm64 /sdcard/frida-server
  • HTTP Toolkit
    24 projects | news.ycombinator.com | 20 Dec 2021
  • Frida 15 Is Out
    1 project | news.ycombinator.com | 17 Jul 2021
    It sounds like a kind of black magic:

    > ...It’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript or your own library into native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX.

    > ...Frida’s core is written in C and injects QuickJS into the target processes, where your JS gets executed with full access to memory, hooking functions and even calling native functions inside the process.

    > There’s a bi-directional communication channel that is used to talk between your app and the JS running inside the target process.

    Here's a description of the architecture:

    https://frida.re/docs/hacking/

    And the source:

    https://github.com/frida/frida

    ---

    Apparently using "wxWindows Library Licence, Version 3.1":

    > This is essentially the LGPL, with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed software using Frida, and also those producing proprietary software.

    https://github.com/frida/frida/blob/master/COPYING

What are some alternatives?

When comparing proxychains and frida you can also consider the following projects:

torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git

objection - 📱 objection - runtime mobile exploration

CrackMapExec - A swiss army knife for pentesting networks

httptoolkit - HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac :tada: Open an issue here to give feedback or ask for help.

Tor - Tor protects your privacy on the Internet by hiding the connection between your Internet address and the services you use. (This is *not* the official repository.)

mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

nipe - An engine to make Tor network your default gateway

Proxyman - Modern. Native. Delightful Web Debugging Proxy for macOS, iOS, and Android ⚡️

sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.

frida-ios-hook - A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform

impacket - Impacket is a collection of Python classes for working with network protocols.

httptoolkit-server - The backend of HTTP Toolkit