A Rare Look Inside a Hacker’s Toolbox Reveals a Stealthy Chinese Proxy Service