Sniffer Proxymon [ROOT]

3.5
445 reviews
100K+
Downloads
Content rating
Rated for 3+
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

Proxymon allows you to debug communication on open and secure TCP connections over IPv4. Proxymon works on the content level and is able to unpack the data. To decrypt SSL/TLS, special CA certificate must be installed to the debugged system.
Updated on
Jun 6, 2020

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection

Ratings and reviews

3.5
430 reviews
A Google user
December 1, 2019
I have all of your apps, and as a info sec hobbyist these are some of the most well rounded apps on the play store for collecting network information. I am always a function over looks kind of guy, but I love the themes you have used with your apps, so that's just a bonus! You (and your team?) Seem very devoted to maintaining these applications over the years, I just wanted to say thanks for your hard work.
92 people found this review helpful
Did you find this helpful?
A Google user
January 9, 2019
Dont' buy, total waste of money. Doesn't work AT ALL, even with root, X-posed and the SSL certificate correctly installed. With the PRO (paid) version, you'll get the same as with the trial - the rigged device (one of yours, of course), will lose the connection as it will get rigged, and will tell its user that someone is trying to sneak on them. No capturing of ANY kind of content being transmitted using your gateway, unlike you'd normally think. Neither 256 kB, nor 1 GB. Just disconnection.
80 people found this review helpful
Did you find this helpful?
evbadroid
January 9, 2019
Thank you for your time!
A Google user
September 16, 2019
It works great, it intercepts SSL connections seamlessly (using iptables) with no need to set a proxy. Features that I'd like to see: decode gzipped HTTP requests, show which app made the request (or UID at least), sort Store by time instead of address, and capture outgoing requests that are dropped. For that last one, I have a firewall (Afwall+). Blocked apps make the requests but they are dropped/rejected by AFwall's iptables rules. proxymon currently does not capture these failed requests.
52 people found this review helpful
Did you find this helpful?

What's new

OpenSSL 3.0.0-alpha3
Host-Ping
No more x86_32bit support