Skip to content

codeblix-ltd/InterceptSuite

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

179 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

InterceptSuite Logo

TCP/UDP TLS/SSL Traffic MITM & Interception

Protocol TCP/TLS, STARTTLS, network traffic MITM proxy that goes beyond traditional HTTP-only tools

๐Ÿš€ InterceptSuite PRO: Looking for advanced features? Check out InterceptSuite PRO with enhanced protocol support and priority features.

๐Ÿš€ Get PRO Version ๐Ÿ“ฅ Downloads โญ Stars Platform Support Documentation


๐ŸŒŸ Overview

InterceptSuite is a cross-platform network traffic interception tool engineered for comprehensive TLS/SSL inspection, analysis, and manipulation at the network level. Unlike traditional tools such as Burp Suite or ZAP that focus specifically on HTTP/HTTPS traffic, InterceptSuite provides unprecedented visibility into any TLS-encrypted protocol, operating seamlessly at the TCP/TLS layer.

๐Ÿš€ InterceptSuite PRO: Looking for advanced features? Check out InterceptSuite PRO with universal TLS upgrade detection that can perform MITM on any TCP-to-TLS transition, PCAP file export capabilities, and priority support. This repository contains the free open-source version.

๐ŸŽฏ The Challenge We Solve

The original inspiration behind InterceptSuite was to address a critical gap in application penetration testing. Security professionals often struggle with limited options for intercepting network traffic from native applications, making it challenging to perform comprehensive packet or traffic analysis of thick clients and custom protocols.

๐Ÿ’ก Our Solution

InterceptSuite bridges this gap by providing a universal TLS interception engine that works with any protocol, giving security researchers the tools they need to analyze, understand, and test encrypted communications effectively. With Python extension support, users can add custom protocol dissection capabilities tailored to their specific needs.

Platform Support

Component Windows Linux macOS
Core Library โœ… โœ… โœ…
GUI Interface โœ… โœ… โœ…

Table of Contents

๐Ÿ“š InterceptSuite PRO

๐Ÿš€ Get InterceptSuite PRO ๐Ÿ“– Documentation

Unlock the full potential of TLS traffic analysis with InterceptSuite PRO

๐ŸŒŸ PRO Features

Feature Free Version PRO Version
๐Ÿ” Standard TLS Handshakes โœ… โœ…
๐Ÿ› ๏ธ Traffic Manipulation โœ… โœ…
๐Ÿ› ๏ธ Python Extension Support โœ… โœ…
๐Ÿ“ Project File Management โŒ โœ…
โšก PCAP File Export โŒ โœ…
๐Ÿ”’ Universal TLS Upgrade Detection โŒ โœ…
๐Ÿ›ก๏ธ Any TCP-to-TLS MITM Capability โŒ โœ…
๐Ÿ“ง STARTTLS Protocols (SMTPS, IMAP, etc.) โŒ โœ…
๐Ÿ“ FTPS with AUTH TLS Support โŒ โœ…
๐Ÿ˜ Database TLS Support (PostgreSQL, MySQL, etc.) โŒ โœ…

Purchase InterceptSuite PRO


โœจ Features

  • ๐ŸŒ Protocol-Agnostic TLS Interception: Intercept TLS/SSL traffic from any application or protocol
  • ๐Ÿ”Œ SOCKS5 Proxy Integration: Uses SOCKS5 proxy protocol for versatile connection handling
  • โšก Real-time Traffic Analysis: View decrypted traffic as it flows through the proxy
  • ๐ŸŽ›๏ธ Connection Management: Track active connections and view their details
  • ๐Ÿ” Certificate Authority Management: Automatic generation of CA certificates with platform-specific storage
  • ๐Ÿ”ง Traffic Manipulation: Modify intercepted traffic before forwarding
  • โšก High-Performance C Core: Optimized C engine for maximum speed and minimal memory footprint
  • ๐Ÿ“š Custom Integration: Embed TLS interception capabilities into your own applications with our DyLib, So and DLL
  • ๐ŸŽจ Modern GUI: Built with Avalonia .NET for cross-platform native performance
  • ๐Ÿ“ Detailed Logging: Comprehensive logging with automatic rotation and cleanup
  • ๐Ÿ Python Extension Support: Add custom protocol dissection with Python plugins

๐Ÿš€ Getting Started

Prerequisites

  • Windows 10/11 (64-bit), Linux (x64), or macOS 13+ (Apple Silicon)

Installation

  1. Download the platform-specific installer from the Releases page
    • Windows: .exe installer
    • Linux: .deb (Ubuntu/Debian) or .rpm (RedHat/Fedora) package
    • macOS: .pkg installer package
  2. Run the installer and follow the setup wizard
  3. Launch InterceptSuite from your applications menu or desktop shortcut

Note: Platform-specific native installers are available for seamless installation on all supported operating systems.

๐Ÿ“– Usage

For comprehensive setup and usage instructions, see our detailed Documentation.

Quick Start

  1. Launch InterceptSuite application
  2. Start the proxy server (default: 127.0.0.1:4444)
  3. Install the generated CA certificate as a trusted root
  4. Configure your client application to use the SOCKS5 proxy
  5. Begin intercepting and analyzing TLS traffic

Important: InterceptSuite generates a unique CA certificate on first run that must be installed as a trusted root certificate authority for TLS interception to work.

GitAds Sponsored

Sponsored by GitAds

๐Ÿ”ง Proxy Configuration

Configure your client application to use the SOCKS5 proxy at 127.0.0.1:4444.

For detailed platform-specific configuration instructions, see the Usage Guide and Documentation.

Platform Notes

  • Windows: Use Proxifier for system-wide SOCKS5 support
  • Linux: Multiple options including ProxyCap, tsocks, Proxychains, or iptables
  • macOS: Proxifier for Mac or Proxychains-ng for terminal applications

๐Ÿค” When to Use InterceptSuite vs. HTTP-Specific Tools

Choose the right tool for your security testing needs with our comprehensive comparison guide.

Note

๐ŸŽฏ Key Recommendation: While InterceptSuite can handle HTTP/HTTPS traffic, it is strongly recommended to use HTTP-specific tools like Burp Suite or ZAP for web traffic inspection. These tools provide specialized features optimized for HTTP-based protocols.

โœ… Use InterceptSuite when:

  • ๐ŸŒ Working with non-HTTP TLS-encrypted protocols
  • ๐Ÿ” Analyzing network traffic at the TCP/TLS layer
  • ๐Ÿ› ๏ธ Debugging custom TLS-encrypted protocols
  • ๐Ÿ“ฑ Testing thick client applications
  • ๐ŸŽฎ Analyzing game or IoT protocols
  • ๐Ÿ”ง Developing protocol-specific security tools

๐ŸŒ Use Burp Suite or ZAP when:

  • ๐ŸŒ Working specifically with HTTP/HTTPS traffic
  • ๐Ÿ–ฅ๏ธ Testing web applications
  • ๐Ÿ”’ Performing web security assessments
  • ๐Ÿ”„ When HTTP-specific features are needed:
    • Request repeating
    • Vulnerability scanning
    • Session management
    • Authentication testing

๐ŸŽฏ Decision Matrix

Scenario InterceptSuite Burp/ZAP Reason
๐ŸŒ Web App Testing โš ๏ธ โœ… HTTP-specific features needed
๐Ÿ“ฑ Mobile App API ๐Ÿค” โœ… Depends on protocol (HTTP vs custom)
๐Ÿ”Œ IoT Device Comms โœ… โŒ Custom TLS protocols
๐Ÿ–ฅ๏ธ Desktop App Traffic โœ… ๐Ÿค” Protocol-dependent
๐Ÿ”’ Database TLS โœ… (PRO) โŒ Free: Limited support, PRO: Full support

Legend: โœ… Recommended โ€ข ๐Ÿค” Depends โ€ข โš ๏ธ Limited โ€ข โŒ Not suitable

๐Ÿ–ผ๏ธ Screenshots & Interface

Explore InterceptSuite's intuitive interface through our comprehensive screenshot gallery showcasing each major feature.

๐Ÿ” Intercept Tab

Intercept Tab

The Intercept tab allows you to view and modify network packets in real-time, providing granular control over TLS traffic flow.

๐Ÿ“š Proxy History Tab

Proxy History Tab

The Proxy History tab shows all messages that have passed through the SOCKS5 proxy with comprehensive logging and filtering capabilities.

โš™๏ธ Settings Tab

Settings Tab

The Settings tab provides configuration options for the proxy server, logging, interception rules, and certificate management. Use the Export Certificate feature to save certificates in different formats.

๐Ÿ”— Connections Tab

Connections Tab

The Connections tab displays TCP connection details and allows for exporting connection data with real-time monitoring of active sessions.

๐Ÿ Protocol Dissection & Python Extensions

InterceptSuite Philosophy: InterceptSuite does not come with built-in protocol dissection capabilities by design. Instead, it provides a powerful Python Extension API that allows users to write and add custom protocol dissection according to their specific needs.

๐ŸŽฏ Why This Approach?

  • ๐Ÿ”ง Flexibility: Write dissectors for any protocol you encounter
  • ๐Ÿš€ Performance: Load only the dissectors you need
  • ๐Ÿ› ๏ธ Customization: Tailor protocol parsing to your specific use cases
  • ๐ŸŒ Community-Driven: Share and collaborate on protocol dissectors
  • ๐Ÿ“ˆ Extensibility: Add new protocols without waiting for official updates

๐Ÿ” Raw Traffic Analysis

Both Free and PRO versions provide:

  • ๐Ÿ“Š Raw Decrypted Traffic: View the actual bytes transmitted
  • ๐Ÿ”— Connection Details: TCP-level connection information
  • โฐ Timestamp Analysis: Precise timing of traffic flows

๐Ÿš€ Getting Started: Check our Python Extension Documentation for tutorials, examples, and API reference.

๐Ÿ’ก Community Extensions: Browse and contribute protocol dissectors at InterceptSuite Extensions Hub

๐Ÿค Contributing

  • ๐Ÿ› Bug Reports - Found an issue? Report it on our GitHub Issues page with detailed reproduction steps.
  • โœจ Feature Requests - Have an idea for improvement? We welcome feature requests and enhancement suggestions.
  • ๐Ÿ”ง Pull Requests - Ready to contribute code? Check our contribution guidelines before submitting PRs.
  • ๐Ÿ“š Documentation - Help improve our documentation, examples, and tutorials for better user experience.

๐Ÿ“„ License

InterceptSuite is open source software, committed to transparency and community collaboration.

AGPL License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0)

๐Ÿ“– Read Full License

The AGPL-3.0 license ensures that InterceptSuite remains free and open source, while requiring that any network-based services using this code also provide their source code to users.


๐Ÿ™ Acknowledgments

Special thanks to the amazing open source communities and technologies that make InterceptSuite possible.

๐Ÿ” OpenSSL

OpenSSL

Providing robust TLS/SSL functionality and cryptographic operations

๐ŸŽจ Avalonia .NET + C Lang

.NET Avalonia C

Modern cross-platform native GUI framework providing excellent performance and user experience

๐Ÿ”จ CMake

CMake

Enabling cross-platform build system management and compilation

๐Ÿ’– Community Support

InterceptSuite is built with love by the cybersecurity community, for the cybersecurity community. Thank you to all contributors, testers, and users who help make this project better every day!


Made with Love

๐Ÿ›ก๏ธ Secure by Design โ€ข ๐ŸŒ Cross-Platform โ€ข ๐Ÿ”“ Open Source

About

A TLS MITM proxy for Non-HTTP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • C# 44.1%
  • C 36.3%
  • Shell 14.6%
  • PowerShell 3.5%
  • Other 1.5%