cs-tools¶
Drop-in wrappers for common security tools that automatically apply SOCKS5 proxy arguments.
Each wrapper checks that cs-proxy is running before executing and exits with a warning if the proxy is down. When multiple tunnels are active, cs-tools automatically rotates across healthy tunnels.
Usage¶
Global Options¶
| Option | Description |
|---|---|
--port PORT |
Override the SOCKS5 proxy port |
--host HOST |
Override the proxy host (default: 127.0.0.1) |
--dry-run |
Print the command that would run without executing it |
--timeout SECS |
Override the default command timeout |
-h, --help |
Show help |
# Preview what nmap command would be executed
cs-tools --dry-run pnmap -p 80,443 target.com
# Use a specific proxy port
cs-tools --port 1081 pcurl https://target.com
# Extend timeout for a slow scan
cs-tools --timeout 900 pnmap -p- target.com
Tools¶
ipcheck¶
Compare your direct IP with the proxied IP.
Output shows both IPs side by side so you can confirm traffic is being routed through the Codespace.
pcurl¶
curl with SOCKS5 proxy.
Automatically adds --socks5-hostname 127.0.0.1:<port>. If multiple tunnels are healthy, a random healthy port is used.
pwget¶
wget via proxychains.
pnmap¶
nmap TCP connect scan through the proxy.
Automatic sanitization: pnmap removes incompatible flags (-sS, -sU, -O, --traceroute, --scanflags) and forces -sT -Pn. It also adds --max-parallelism 10 to prevent overloading the proxy.
⚠️ Security warning: Running nmap as root defaults to SYN scan (
-sS), which bypasses the SOCKS proxy and leaks your real IP.cs-toolsforces TCP connect scan (-sT) to keep all traffic inside the tunnel.
pnuclei¶
nuclei with proxy.
pffuf¶
ffuf with proxy.
cs-tools pffuf -u https://target.com/FUZZ -w wordlist.txt
cs-tools pffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200,301
phttpx¶
httpx with proxy.
cs-tools phttpx -l domains.txt -title -status-code -tech-detect
cs-tools phttpx -u https://target.com -follow-redirects
psqlmap¶
sqlmap with proxy.
pcs¶
Generic proxychains wrapper for any command.
cs-tools pcs gobuster dir -u https://target.com -w wordlist.txt
cs-tools pcs whatweb https://target.com
cs-tools pcs ssh user@target.com
psub¶
Subdomain enumeration (requires subfinder).
pportscan¶
Quick port scan against common ports.
Default ports: 21,22,23,25,80,443,445,3306,3389,8080,8443
Smart Tunnel Rotation¶
When multiple tunnels are active, cs-tools wrappers read state.json and pick a random healthy tunnel port. This means:
cs-proxy -n 2 start -l WestEurope -l EastUs
# Each cs-tools call may use a different exit IP automatically
cs-tools pnmap -p 80,443 target.com
cs-tools phttpx -l hosts.txt
If no healthy tunnels exist, tools fall back to the default socks_port.
Default Wordlists¶
cs-tools looks for SecLists at ~/wordlists/SecLists/ (override with SECLISTS env var):
| Variable | Default Path |
|---|---|
| Common | Discovery/Web-Content/common.txt |
| Big | Discovery/Web-Content/big.txt |
| Dirs | Discovery/Web-Content/directory-list-2.3-medium.txt |
| Params | Discovery/Web-Content/burp-parameter-names.txt |
| Subdomains | Discovery/DNS/subdomains-top1million-5000.txt |