cs-tools¶
Drop-in wrappers for common security tools that automatically apply SOCKS5 proxy arguments.
Each wrapper checks that cs-proxy is running before executing and exits with a warning if the proxy is down.
Usage¶
Tools¶
ipcheck¶
Compare your direct IP with the proxied IP.
Output shows both IPs side by side so you can confirm traffic is being routed through the Codespace.
pcurl¶
curl with SOCKS5 proxy.
Automatically adds --socks5-hostname 127.0.0.1:<port>.
pwget¶
wget via proxychains.
pnmap¶
nmap TCP connect scan through the proxy.
Uses proxychains with -sT (TCP connect) since SYN scans can't go through SOCKS.
pnuclei¶
nuclei with proxy.
pffuf¶
ffuf with proxy.
cs-tools pffuf -u https://target.com/FUZZ -w wordlist.txt
cs-tools pffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200,301
phttpx¶
httpx with proxy.
cs-tools phttpx -l domains.txt -title -status-code -tech-detect
cs-tools phttpx -u https://target.com -follow-redirects
psqlmap¶
sqlmap with proxy.
pcs¶
Generic proxychains wrapper for any command.
cs-tools pcs gobuster dir -u https://target.com -w wordlist.txt
cs-tools pcs whatweb https://target.com
cs-tools pcs ssh user@target.com
psub¶
Subdomain enumeration (requires subfinder).
pportscan¶
Quick port scan against common ports.
Default ports: 21,22,23,25,80,443,445,3306,3389,8080,8443
Default Wordlists¶
cs-tools looks for SecLists at ~/wordlists/SecLists/ (override with SECLISTS env var):
| Variable | Default Path |
|---|---|
| Common | Discovery/Web-Content/common.txt |
| Big | Discovery/Web-Content/big.txt |
| Dirs | Discovery/Web-Content/directory-list-2.3-medium.txt |
| Params | Discovery/Web-Content/burp-parameter-names.txt |
| Subdomains | Discovery/DNS/subdomains-top1million-5000.txt |