Skip to content

Commit 304b63a

Browse files
committed
Merge remote-tracking branch 'origin/master'
2 parents ecf3582 + 8734a0c commit 304b63a

File tree

2 files changed

+13
-5
lines changed

2 files changed

+13
-5
lines changed

.github/FUNDING.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,3 @@
11
# These are supported funding model platforms
22
patreon: null0perat0r
3+
github: factionsecurity

README.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,13 +45,13 @@ This non-HTTP proxy has several features built in.
4545
- Use python code to reformat requests in history without changing outgoing or incomming requests. (e.g. Convert protobuf to JSON or human readable formats without modifying the incomming or outgoing traffic)
4646

4747

48-
## TCP Repeater
48+
## TCP/UDP Repeater
4949

5050
![](http://imgur.com/aNpzAdz.png)
5151

52-
- TCP repeater can be used to replay requests to the client or server on the currently connected socket streams.
52+
- TCP/UDP repeater can be used to replay requests to the client or server on the currently connected socket streams.
5353
- Code Playground allows you to create a custom python payload based on the request currently displayed in the repeater.
54-
- Search TCP proxy History
54+
- Search TCP/UDP proxy history
5555

5656
## Configure the proxies
5757

@@ -64,9 +64,11 @@ Once you know the right host name and port you can configure these settings as s
6464
The proxy does not start until ‘enable’ is checked in the table.
6565

6666
Once the proxy is started you can intercept it in real time. All your traffic will be logged into the TCP History Tab and stored locally in a sqlite database. The database can be exported or imported from the Server Configuration Tab. In addition, if Burp crashes or you close burp without saving the TCP History it will still be automatically loaded when you start Burp.
67+
6768
## Manual Intercept Traffic
6869
![](http://imgur.com/X6xYsq8.png)
6970
Clicking on the TCP Intercept Tab will allow to enable and disable Manual Intercepting. This will be very similar to intercepting HTTP traffic with burp. If the data sent is just strings then it’s very simple to just replace text or attempt modification to the request. If the application is sending serialized objects or protobuffs then you will need to switch between Raw and Hex mode to ensure the data is encoded correctly and length checks are correct.
71+
7072
## Automated Manipulation of Traffic
7173
Once you have your ideal payload you can automatically match and replace in the Automation Tab.
7274
![](http://imgur.com/CBRQVIo.png)
@@ -126,12 +128,17 @@ Now we use the pre and post interceptor functions to make it easier to modify in
126128

127129
Below is an example of the now Human Readable and Editable Protobufs.
128130

129-
![](NonHTTPProxy/screenshots/Post%20Format.PNG)
131+
![](NonHTTPProxy/screenshots/Post%20Format.PNG)A
132+
133+
## Highlighting Traffic
134+
You can select mutliple requests and responses and highlight them with custom colors. You can even search only highlighted items. This makes is easy to find interesting requests later that you might want to dig into further.
135+
![image](https://github.com/summitt/Nope-Proxy/assets/2343831/ee6d6f98-6f9b-4644-8fa3-5573c058ee7c)
136+
130137

131138

132139
### Upcomming features
133140
- UDP repeater
134-
- Swithes in the python manger for TCP or UDP request only modification
141+
- Switches in the python manger for TCP or UDP request only modification
135142
- Ability to decrypted encrypted UDP traffic like QUIC and other protocols
136143
- Ability to auto sense encrypted traffic so it can better decode XMPP, SSH, SFTP, etc.
137144

0 commit comments

Comments
 (0)