commands // 2026-01-05 // ID: REF-Proxychains Command List

Proxychains Command List


Proxychains Command Guide

Proxychains forces any TCP connection made by a given application to follow through a proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy.

Top 10 Useful Commands

1. Basic Usage

proxychains nmap -sT 10.10.10.10

Explanation: Run command through the proxy defined in /etc/proxychains4.conf.

2. Using Firefox

proxychains firefox

Explanation: Forces the browser through the proxy chain (e.g., to browse internal sites via SOCKS).

3. Quiet Mode

proxychains -q nmap ...

Explanation: Don't print "S-chain... OK" logs to stdout.

4. Configuration

nano /etc/proxychains4.conf

Explanation: Edit this file to add your proxies (e.g., socks5 127.0.0.1 1080).

5. Dynamic Chain

# Set "dynamic_chain" in conf

Explanation: Skips dead proxies in the list.

6. Strict Chain

# Set "strict_chain" in conf

Explanation: Failing one proxy breaks the connection (good for strict anonymity paths).

7. Random Chain

# Set "random_chain" in conf

Explanation: Use random proxies from list.

8. DNS Proxying

# "proxy_dns" in conf

Explanation: Resolves DNS through the proxy (prevents DNS leaks).

9. With SSH Tunnel

ssh -D 1080 user@pivot
# Then run proxychains

Explanation: Use Dynamic Port Forwarding to pivot into a network.

10. With Metasploit

proxychains msfconsole

Explanation: Run the entire framework through a proxy.

The Most Powerful Command

proxychains nmap -sT -Pn -n 192.168.1.10

Explanation: A "Full Pivot" scan. You are scanning an internal IP address (192.168.1.10) that your machine cannot see, by tunneling the Nmap request through a compromised jump host.