3proxy : 3Proxy is really tiny cross-platform proxy servers set ( http://www.3proxy.ru/ )
burpsuite : an interactive HTTP/S proxy server for attacking and debugging web-enabled applications ( http://portswigger.net/suite/ )
mallory : An TCP/UDP transparent proxy that can be used to intercept network streams ( https://intrepidusgroup.com/insight/mallory/ )
pbounce : Multiplexes multiple TCP connections into internal network via reverse connection ( http://www.o0o.nu/projects/bouncers )
proxenet : A hacker friendly proxy for web application penetration tests. ( https://github.com/hugsy/proxenet )
proxenet-plugins : Repository for proxenet plugins ( https://github.com/hugsy/proxenet )
proxystrike : A tool designed to find vulnerabilities while browsing an application ( http://code.google.com/p/proxystrike/ )
pwnat : allows clients behind NATs to communicate with a server behind a separate NAT to communicate with each other ( http://samy.pl/pwnat/ )
redsocks : Transparent redirector of any TCP connection to proxy ( http://darkk.net.ru/redsocks/ )
sshttp : an easy to use OSI-Layer5 switching daemon ( http://c-skills.blogspot.com/ )
sslsplit : Transparent and scalable SSL/TLS interception ( http://www.roe.ch/SSLsplit )
webscarab : A framework for analysing applications that communicate using the HTTP and HTTPS protocols ( http://www.owasp.org/software/webscarab.html )
zaproxy : An easy to use integrated penetration testing tool for finding vulnerabilities in web applications ( http://code.google.com/p/zaproxy/ )
Pour rajouter une e-build dans l'arbre de portage :
L'ebuild est alors rajouté dans l'arbre de portage.
Vous pouvez aussi utiliser layman : emerge layman puis layman -a spike
Pour Paludis utilisez ce rsync : rsync://gentoo.zugaina.org/spike-portage
En cas de problèmes : ycarus(-at-)zugaina.org