A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
-
Updated
Apr 26, 2022 - Python
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
CERT Tapioca for MITM network analysis
Intercept Google Antigravity IDE API calls and use your own Gemini API token
Messenger SSL Pinning Bypass for Android – intercept Messenger traffic..
A Node.js SOCKS5/HTTP proxy that intercepts web traffic and transforms modern JavaScript, CSS, and HTML for legacy browsers like Safari 9 on iPad 2, iPod Touch, and iPad Mini (iOS 9+).
Some Android applications blacklist default Burp Suite or PortSwigger certificates to prevent interception. This script helps you generate your own custom OpenSSL certificate to bypass such restrictions and perform effective HTTPS traffic interception on Android devices.
WiP!!!!!! A Python network honeypot for malware analysis featuring automatic SSL/TLS interception, multi-protocol support (HTTP/HTTPS/FTP/SMTP/DNS), and zero-configuration setup. Includes traffic generator for realistic malware communication simulation.
Add a description, image, and links to the ssl-interception topic page so that developers can more easily learn about it.
To associate your repository with the ssl-interception topic, visit your repo's landing page and select "manage topics."