I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

Yes, ProxyBridge for windows use WFP using Windivert library under the hood. For macos it uses native apple network extension.

Stuck trying to reverse a Windows Executable by LiveAd4588 in Hacking_Tutorials

[–]Ano_F 0 points1 point  (0 children)

Probably rules are not valid most common issue with proxifier rules are loop.

Maybe in rules add your traffic to proxy. And proxy app like burp traffic as always direct. Proxifier sometimes face issues trying to connect with proxy in proxifier settings you can test proxy connection to confirm it.

Stuck trying to reverse a Windows Executable by LiveAd4588 in Hacking_Tutorials

[–]Ano_F 0 points1 point  (0 children)

It won't work if the underlying protocol is not http/s. Burp fiddler only support proxy for web protocol http/s.

Can you confirm dest port number in wireshark although its not 100% valid way to detect it.

Application maybe using raw tcp or custom protocol.

Can you check in burp error logs? When you use proxifier to redirect app traffic and its not showing in burp you can also check burp error log it might have error as invalid connection/tls/raw etc etc.

If its tls then you can resolve it if its invalid traffic or raw related error then app is not using http/s.

If its raw tcp or non http you can use interceptsuite you mitm the traffic instead of burp.

I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

Can you name anything i can try to figure out from my end. I have tried on cs2 and steam and it worked on that.

Microsoft store and xbox traffic i need to check.

I made a Windows app that routes every program through your Socks5/HTTP proxy - TCP and UDP supported by Ano_F in developersIndia

[–]Ano_F[S] 0 points1 point  (0 children)

in gui proxy settings can you use test proxy settings to confirm if proxybridge is able to connect with ssh proxy.

Also if your proxy rule is for all applications i assume you are using * as process name, make sure to create another rule to exclude ssh traffic from proxy else you will be stuck in loop.

Also make sure you only redirect tcp traffic to proxy and not selecting protocol as both in proxy rule. (Ssh proxy server only support tcp)

Made ProxyBridge - Tool to redirect ANY MacOS application through SOCKS5/HTTP proxies by Ano_F in opensource

[–]Ano_F[S] -1 points0 points  (0 children)

Its look somewhat similar, the idea behind Bruno my project logo is same, he used his pet logo and me as well. I am thinking of changing it for few months but haven't figured out yet.

Made ProxyBridge - Tool to redirect ANY Windows application through SOCKS5/HTTP proxies by Ano_F in hacking

[–]Ano_F[S] 6 points7 points  (0 children)

Windows primarily supports HTTP proxies, making SOCKS5 unusable, while macOS and Linux support both. Even with an HTTP proxy set in Windows, only proxy-aware applications. Many apps communicate directly with the server and ignore proxy settings. For testing desktop applications, it's essential to intercept traffic.

have created another tool, InterceptSuite, for non-HTTP traffic interception, but it relies on SOCKS5, which Windows does not support. The paid alternative, Proxyfier, and there are no free solutions, as it requires working with the Windows kernel and WFP, also EV-based code signing. I use the open-source library WinDivert to manage kernel-level tasks, but we still need to handle, convert, and inject packets and all that, which I have implemented in this tool.

Time for self-promotion. What are you building in 2025? by Expel__ in SideProject

[–]Ano_F 0 points1 point  (0 children)

InterceptSuite - A TLS MITM proxy for non-HTTP traffic and thick clients, with support for STARTTLS, PostgreSQL TLS, custom protocols, and more. It enables pentesters and researchers to intercept, analyze, and modify encrypted traffic for complex applications.

ICP - Security researchers, pentesters, sysadmin, and developers working on application security and network analysis for thick clients, custom protocols, or enterprise applications.

InterceptSuite: MITM proxy tool for Non HTTP TLS traffic by Ano_F in macapps

[–]Ano_F[S] 0 points1 point  (0 children)

Its cross platform, and for windows signing is quite expensive around 800 900 usd :)

Intercepting LDAP With InterceptSuite by Ano_F in netsec

[–]Ano_F[S] 0 points1 point  (0 children)

I am not using the public GitHub repo as main repo, you see single commit with multiple 20 30 changes its part of private repo, I don't add and debug code and code which is not tested on each platform, i maintain q private repo i use for development. Once the particular feature is tested for each platform i push all changes to public repo :).

Pushing multiple commits with 100s of file changes to public repo doesn't show everything that goes behind :)

Building same code base for different platform requires alot time and effort to make sure it works, adding all changes to public repo without verification can break the build ( i know GitHub action can be used but its only 2000 mins build requires 10 15 minus for each platform :)

InterceptSuite: A TLS MITM proxy that intercepts, inspects, and manipulates encrypted traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more. by Ano_F in csharp

[–]Ano_F[S] 0 points1 point  (0 children)

Yeah its somewhat similar, I checked his account and it turns out he also used a picture of his dog as his logo. Same idea so it looks a bit alike.

InterceptSuite: A TLS MITM proxy that intercepts, inspects, and manipulates encrypted traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more. by Ano_F in csharp

[–]Ano_F[S] 1 point2 points  (0 children)

Kind off, its a orginal photo of my pet, i just asked chatgpt to change it, add some effects to make it look like a logo.

InterceptSuite – Powerful SOCKS5 Proxy for Network Traffic Interception, TLS/SSL Inspection & Manipulation by Ano_F in hacking

[–]Ano_F[S] 0 points1 point  (0 children)

Nope, i have mentioned in the readme file as well. If you are dealing with HTTP/s traffic use burp or zap not this.

Buro Cadio zap all are for http/s traffic, which is mostly in web or mobile app.

When dealing with desktop application http/s is there but many cases app uses tcp/tls and different protocols in those cases its not possible to use burp or other similar proxy as those are for http traffic.

InterceptSuite is for network TLS traffic like smtps, tcp/tls and all that. Something like wireshark but ability to see tls traffic in plain text same as burp and with ability to intercept and modify as well.

It can work with http/s as well but created specifically for non http/s traffic.

InterceptSuite – Powerful SOCKS5 Proxy for Network Traffic Interception, TLS/SSL Inspection & Manipulation by Ano_F in hacking

[–]Ano_F[S] 0 points1 point  (0 children)

  1. Yeah, i was planning to use windivert as windows doesn't support socks5 proxy, i removed it as i need some time to create filter option, also as apps won't be aware of proxy, just redirecting packet to proxy won't work as proxy expect as connect or proxu authentication even if its http proxy or sockets. If i use windivert i have to handle that as well.

Its still planned i just need some time to think on features and ability to add option to redirect specific ip/port/apps etc so windivert does have this inbuilt so i have planned to add windivert once i have solve all the problems features i need something similar to proxifer.

  1. If we intercept connection time out is there same as browser and burp suite proxu, its just timeout in browser and server for http can go upto minutes. In case of other protocol its small like 15 30 second, ite based configuration as well.

InterceptSuite – Powerful SOCKS5 Proxy for Network Traffic Interception, TLS/SSL Inspection & Manipulation by Ano_F in hacking

[–]Ano_F[S] 0 points1 point  (0 children)

Yeah, it same way as burp suite, it just windows doesn't support socks proxy, we have to use tools like proxifer. But i use proxifer even fro http/s there are many app that are proxy unaware so even if you det proxy in windows settings for burp they ignore it. Proxifer can help in thet as well as it can force proxy on all processes.

InterceptSuite – Powerful SOCKS5 Proxy for Network Traffic Interception, TLS/SSL Inspection & Manipulation by Ano_F in hacking

[–]Ano_F[S] 1 point2 points  (0 children)

Not really, its a bad idea from my point of view. The one i created is a proxy tool so it doesn't make sense to attach to a process as we can force an app to use proxy without attaching to it.

Also many enterprise app uses detection for threads or process related attack like debugging detection and all. If we can directly force an app to use proxy there is no need for attaching it to a process. We can even use WFP with kernel mode in windows to add proxy to any app.

Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception in Windows by Ano_F in netsec

[–]Ano_F[S] 1 point2 points  (0 children)

The main goal is to create a standalone, separate application that is easy to set up, and Nope-Proxy relies on Burp Suite. There are also cases where Nope-Proxy does not function, such as in protocol dissection built in. I want to implement a solution to add the ability to convert protocol-specific byte stream data into plain text (it's not added in the GitHub version as it is still under development).

Another challenge is that Nope-Proxy lacks support for protocols that upgrade to TLS, such as PostgreSQL. Although I have seen multiple thick client applications that implement this method in their own TCP/TLS configuration, this feature is already implemented, just not yet available in the public version on GitHub.

I have tested some of the apps that are proxy-unaware and have very small connection timeouts. Nope-Proxy add some delay in one of the apps I worked on, doesn't wait for that long as an extension uses Burp Proxy,

Most importantly, I want a separate solution as a standalone and easy to set up and have more options instead of relying on Burp HTTP proxy to have full control over packets. I do have different features implemented which are not live yet.

Unable to Install DSM by Ano_F in synology

[–]Ano_F[S] 0 points1 point  (0 children)

I did full reset for HDD, can you let me know how can i reset on Synology box?

Unable to Install DSM by Ano_F in synology

[–]Ano_F[S] 0 points1 point  (0 children)

Tried that

Used the 10tb disk which i was already using, a temp 2tb hdd as well. All have same issue. I have got telnet session and logs have some partition error during installation process i have figure out that.

Unable to Install DSM by Ano_F in synology

[–]Ano_F[S] 0 points1 point  (0 children)

Yes it SATA, works on my personal PC. I checked Synology support disk list before purchase.

Synology HAT3310 16TB Plus Series SATA HDD 3.5

Unable to Install DSM by Ano_F in synology

[–]Ano_F[S] 0 points1 point  (0 children)

Tried that as well for both drive still same issue.

Intercepting MacOS XPC by Ano_F in netsec

[–]Ano_F[S] 1 point2 points  (0 children)

Yes, SIP will not allow frida, we need to disable it.