Ownify is a configurable Proxy connection (only HTTP was tested). At the time of the extension's release, it already has the functionality of whitelisting sites, hiding WebRTC leaks, spoofing Chrome User-Agent, and auto-updating the whitelist.
Working with Ownify
The installation of Ownify is available on Chromium browsers. If there is a stir, I will make a version for FireFox :). https://chromewebstore.google.com/detail/ownify/aiipddepmffihjeoaailegfackjihajd
Personally, I'm getting around it. But it may depend on your provider and a bunch of other criteria
Try to test curl with the required parameters. If everything is still not working, write to me in Telegram: t.me/dsvl0
Ownify uses the following syntax for input:
{"host": "xx.xx.xx.xxx", "scheme": "http", "PCP": 443, "PCN": "QspyzVtfsobnf", "PCA": "ZpvsQbttxpse"}ГДЕ:
- host -> IP Address
- scheme -> HTTP (Possibly SOCKS5, I haven't tested it)
- PCP -> Proxy Connection Port
- PCN -> Proxy Connection Username (If needed) (! ROT1 Encoded !)
- PCA -> Proxy Connection Passwrod (If needed) (! ROT1 Encoded !)
The encoding function in ROT1 (JavaScript):
function rot1Encode(str) {
return [...str].map(c =>
c >= 'A' && c <= 'Y' || c >= 'a' && c <= 'y' ? String.fromCharCode(c.charCodeAt(0) + 1) :
c === 'Z' ? 'A' : c === 'z' ? 'a' : c
).join('');
}