Find security vulnerabilities in web applications.
Change proxy settings on the fly.
Check SOCKS4/SOCKS5/HTTP/HTTPS proxies with and without authentication.