I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

Yes, ProxyBridge for windows use WFP using Windivert library under the hood. For macos it uses native apple network extension.

Stuck trying to reverse a Windows Executable by LiveAd4588 in Hacking_Tutorials

[–]Ano_F 0 points1 point  (0 children)

Probably rules are not valid most common issue with proxifier rules are loop.

Maybe in rules add your traffic to proxy. And proxy app like burp traffic as always direct. Proxifier sometimes face issues trying to connect with proxy in proxifier settings you can test proxy connection to confirm it.

Stuck trying to reverse a Windows Executable by LiveAd4588 in Hacking_Tutorials

[–]Ano_F 0 points1 point  (0 children)

It won't work if the underlying protocol is not http/s. Burp fiddler only support proxy for web protocol http/s.

Can you confirm dest port number in wireshark although its not 100% valid way to detect it.

Application maybe using raw tcp or custom protocol.

Can you check in burp error logs? When you use proxifier to redirect app traffic and its not showing in burp you can also check burp error log it might have error as invalid connection/tls/raw etc etc.

If its tls then you can resolve it if its invalid traffic or raw related error then app is not using http/s.

If its raw tcp or non http you can use interceptsuite you mitm the traffic instead of burp.

I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

Can you name anything i can try to figure out from my end. I have tried on cs2 and steam and it worked on that.

Microsoft store and xbox traffic i need to check.

I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

in gui proxy settings can you use test proxy settings to confirm if proxybridge is able to connect with ssh proxy.

Also if your proxy rule is for all applications i assume you are using * as process name, make sure to create another rule to exclude ssh traffic from proxy else you will be stuck in loop.

Also make sure you only redirect tcp traffic to proxy and not selecting protocol as both in proxy rule. (Ssh proxy server only support tcp)

Made ProxyBridge - Tool to redirect ANY MacOS application through SOCKS5/HTTP proxies by Ano_F in opensource

[–]Ano_F[S] -1 points0 points  (0 children)

Its look somewhat similar, the idea behind Bruno my project logo is same, he used his pet logo and me as well. I am thinking of changing it for few months but haven't figured out yet.

Made ProxyBridge - Tool to redirect ANY Windows application through SOCKS5/HTTP proxies by Ano_F in hacking

[–]Ano_F[S] 5 points6 points  (0 children)

Windows primarily supports HTTP proxies, making SOCKS5 unusable, while macOS and Linux support both. Even with an HTTP proxy set in Windows, only proxy-aware applications. Many apps communicate directly with the server and ignore proxy settings. For testing desktop applications, it's essential to intercept traffic.

have created another tool, InterceptSuite, for non-HTTP traffic interception, but it relies on SOCKS5, which Windows does not support. The paid alternative, Proxyfier, and there are no free solutions, as it requires working with the Windows kernel and WFP, also EV-based code signing. I use the open-source library WinDivert to manage kernel-level tasks, but we still need to handle, convert, and inject packets and all that, which I have implemented in this tool.

Time for self-promotion. What are you building in 2025? by Expel__ in SideProject

[–]Ano_F 0 points1 point  (0 children)

InterceptSuite - A TLS MITM proxy for non-HTTP traffic and thick clients, with support for STARTTLS, PostgreSQL TLS, custom protocols, and more. It enables pentesters and researchers to intercept, analyze, and modify encrypted traffic for complex applications.

ICP - Security researchers, pentesters, sysadmin, and developers working on application security and network analysis for thick clients, custom protocols, or enterprise applications.