AI-Powered Proxy Management for Cybersecurity Professionals
RedAgent transforms complex proxy management into simple conversations. Using natural language processing with DeepSeek AI, it automates proxy discovery, security auditing, chain building, and integration with security tools like nmap and proxychains.
Traditional proxy management requires memorizing complex commands and manual configuration. RedAgent revolutionizes this by:
- Understanding intent through natural language
- Automating tedious tasks like proxy discovery and testing
- Providing security assurance through comprehensive auditing
- Integrating seamlessly with existing security tools
# Clone the repository
git clone https://github.com/Insider77Circle/Red-Agent.git
cd Red-Agent
# Install dependencies
pip install -r requirements.txt
# Configure environment
cp .env.example .env
# Add your DeepSeek API key to .env file
# Run RedAgent
python main.py"Find me fast proxies and check for DNS leaks"
graph TB
A[User Input] --> B[DeepSeek AI]
B --> C[Tool Registry]
C --> D[Proxy Pool Manager]
C --> E[Security Auditor]
C --> F[Chain Builder]
C --> G[Discovery Engine]
D --> H[Proxy Storage]
E --> I[Security Reports]
F --> J[Chain Configs]
G --> K[Public APIs]
H --> L[Proxychains Integration]
I --> L
J --> L
L --> M[External Tools<br/>nmap, curl, etc.]
- Conversational Commands: "Build me a 3-hop chain through Europe"
- Context Awareness: Remembers previous commands and maintains conversation flow
- Rich Terminal UI: Beautiful console output with panels, tables, and formatted responses
flowchart LR
A[Discovery] --> B[Validation]
B --> C[Organization]
C --> D[Maintenance]
D --> E[Optimization]
E --> A
style A fill:#f9f,stroke:#333
style B fill:#bbf,stroke:#333
style C fill:#bfb,stroke:#333
style D fill:#fbf,stroke:#333
style E fill:#ffb,stroke:#333
- DNS Leak Detection: Ensures your real IP isn't exposed
- TLS Interception Detection: Identifies MITM attacks by comparing certificate fingerprints
- Content Injection Detection: Finds proxies modifying HTTP responses
- Anonymity Classification: Classifies proxies as transparent, anonymous, or elite
┌─────────────────────────────────────────┐
│ Multi-Hop Proxy Chain │
├─────────────────────────────────────────┤
│ Your IP → Proxy 1 → Proxy 2 → Target │
│ ↓ ↓ ↓ ↓ │
│ [US] [DE] [FR] [Target] │
└─────────────────────────────────────────┘
# RedAgent generates ready-to-use configurations
proxychains nmap -sS target.com
proxychains curl https://api.example.com
proxychains python scanner.py- Tor SOCKS5 Integration: Built-in Tor proxy checking
- Verification: Confirms actual Tor routing via Tor Project API
- Chain Integration: Use Tor as final hop in proxy chains
RedAgent/
├── main.py # Entry point with CLI interface
├── requirements.txt # Python dependencies
├── .env.example # Environment template
├── agent/ # AI chat session management
│ ├── chat.py # Chat session handler
│ ├── system_prompt.py # AI system instructions
│ └── tools.py # Tool registry system
├── proxy/ # Proxy management core
│ ├── pool.py # Proxy storage and management
│ ├── checker.py # Health and anonymity checking
│ ├── discovery.py # Proxy discovery from APIs
│ ├── router.py # Chain building and routing
│ ├── proxychains.py # Proxychains config generation
│ └── models.py # Data models and schemas
├── security/ # Security auditing tools
│ ├── dns_leak.py # DNS leak detection
│ ├── tls_check.py # TLS interception detection
│ └── analyzer.py # Comprehensive security analysis
├── observability/ # Monitoring and metrics
│ ├── logger.py # Structured logging
│ └── metrics.py # Performance tracking
└── data/ # Persistent storage
├── proxies.json # Proxy pool database
└── proxychains.conf # Generated configurations
"Find 50 elite proxies from Europe"
"Check all proxies for DNS leaks"
"Remove dead proxies from the pool"
"Show me proxy performance metrics"
"Build a 3-hop chain through US, DE, and FR"
"Create a rotation chain with the fastest proxies"
"Generate proxychains config for nmap scanning"
"Test Tor availability and integrate into chain"
"Run comprehensive security audit on all proxies"
"Check for TLS interception on elite proxies"
"Test proxy chain for content injection"
"Verify anonymity levels before sensitive operation"
pie title Red Team Operations
"Anonymous Reconnaissance" : 35
"Geographic Testing" : 25
"Rate Limit Evasion" : 20
"C2 Communication" : 15
"Data Exfiltration" : 5
- Threat Intelligence: Safely interact with malicious infrastructure
- Honeypot Management: Gather attacker tactics through proxies
- Control Validation: Test security controls from external perspectives
- Incident Response: Investigate through clean infrastructure
- Scope Compliance: Test from allowed geographic regions
- Anonymity Protection: Maintain privacy while reporting
- Persistent Testing: Continue when IPs get blocked
- Tool Integration: Use favorite tools through proxy chains
Create a .env file with:
DEEPSEEK_API_KEY=your_api_key_hereRedAgent supports multiple proxy sources:
- ProxyScrape API: Free public proxies
- Geonode API: Detailed proxy metadata
- Manual Addition: Add custom proxies individually or in bulk
- strict_chain: Proxies used in exact order (fail if any proxy fails)
- dynamic_chain: Proxies used in order, can skip dead ones
- random_chain: Random proxy selection from the chain
┌─────────────────────────────────────┐
│ Proxy Performance │
├─────────────┬─────────────┬─────────┤
│ Metric │ Average │ Goal │
├─────────────┼─────────────┼─────────┤
│ Latency │ 142ms │ <200ms │
│ Success Rate│ 94% │ >90% │
│ Anonymity │ Elite │ Elite │
│ Uptime │ 98% │ >95% │
└─────────────┴─────────────┴─────────┘
- Active Verification: Tests proxies before use
- Transparency: Shows exactly what tests are run
- Warning System: Alerts about potential security issues
- Clean Infrastructure: Removes problematic proxies automatically
- Free Proxies: Public proxies should never be used for sensitive data
- Trust Model: You must trust the proxy providers
- Performance Trade-offs: Anonymity often comes at the cost of speed
- Legal Compliance: Ensure compliance with local laws and regulations
- Always audit new proxies before sensitive operations
- Use elite anonymity proxies for critical tasks
- Regularly rotate proxy infrastructure
- Monitor for leaks during long-running operations
- Maintain clean infrastructure with regular health checks
We welcome contributions! Please see our Contributing Guidelines for details.
# Clone and setup development environment
git clone https://github.com/Insider77Circle/Red-Agent.git
cd Red-Agent
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
pip install -r requirements.txt
pip install -r requirements-dev.txt # Development dependenciespytest tests/ -vThis project is licensed under the MIT License - see the LICENSE file for details.
- DeepSeek for providing the AI API powering natural language interactions
- ProxyScrape & Geonode for public proxy APIs
- The cybersecurity community for inspiration and feedback
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Documentation: Wiki
Made with ❤️ for the cybersecurity community
"Talk to your proxies, they're listening."