3proxy : 3Proxy is really tiny cross-platform proxy servers set ( http://www.3proxy.ru/ )
burpsuite : an interactive HTTP/S proxy server for attacking and debugging web-enabled applications ( http://portswigger.net/suite/ )
mallory : An TCP/UDP transparent proxy that can be used to intercept network streams ( https://intrepidusgroup.com/insight/mallory/ )
pbounce : Multiplexes multiple TCP connections into internal network via reverse connection ( http://www.o0o.nu/projects/bouncers )
proxenet : A hacker friendly proxy for web application penetration tests. ( https://github.com/hugsy/proxenet )
proxenet-plugins : Repository for proxenet plugins ( https://github.com/hugsy/proxenet )
proxystrike : A tool designed to find vulnerabilities while browsing an application ( http://code.google.com/p/proxystrike/ )
pwnat : allows clients behind NATs to communicate with a server behind a separate NAT to communicate with each other ( http://samy.pl/pwnat/ )
redsocks : Transparent redirector of any TCP connection to proxy ( http://darkk.net.ru/redsocks/ )
sshttp : an easy to use OSI-Layer5 switching daemon ( http://c-skills.blogspot.com/ )
sslsplit : Transparent and scalable SSL/TLS interception ( http://www.roe.ch/SSLsplit )
webscarab : A framework for analysing applications that communicate using the HTTP and HTTPS protocols ( http://www.owasp.org/software/webscarab.html )
zaproxy : An easy to use integrated penetration testing tool for finding vulnerabilities in web applications ( http://code.google.com/p/zaproxy/ )
Add an ebuild in portage :
The ebuild is now in the portage tree.
You can also use layman : emerge layman then layman -a spike
For Paludis use this rsync : rsync://gentoo.zugaina.org/spike-portage
If you have a problem : ycarus(-at-)zugaina.org