A powerful desktop application for intercepting, analyzing, and manipulating HTTP/HTTPS traffic from mobile devices. Built with Electron, Vue 3, and TypeScript.
Trafexia provides comprehensive tools for mobile app security testing, reverse engineering, and API debugging with advanced features like SSL pinning bypass, request mocking, traffic mapping, and more.
- Built-in Bypass Scripts - Supports OkHttp3, Conscrypt, WebView, Flutter, React Native, and more
- APK Patching - Inject bypass scripts directly into APKs without requiring rooted devices
- Frida Gadget Integration - Dynamic code injection using Frida for runtime hooking
- Root & Emulator Evasion - Advanced system hooks to bypass security constraints on highly-secure apps
Secure Protocol Bypass with packaging, dynamic injection, and traffic options
Dynamic bypass injection with framework selection and live stream monitoring
- Live Request Capture - Intercept and display HTTP/HTTPS requests in real-time
- Request Timeline Visualization - See request distribution and patterns over time
- Advanced Filtering - Filter by HTTP method, status code, host, URL path, and more
- Request Comparison - Side-by-side diff view to compare original vs. modified requests
Real-time request capture with detailed headers, body, and response analysis
Visual timeline showing request distribution and frequency
Side-by-side request comparison with header and response diff
- Request Mapping - Map requests to different URLs with regex pattern support
- Mock Responses - Create mock responses with custom status codes, headers, and bodies
- Request Composer - Build and test custom HTTP requests
- Throttling Control - Simulate network conditions and bandwidth limitations
Map requests to different destinations with regex patterns and method selection
Create mock responses with custom status codes, headers, and response bodies
- Frida Interception Engine - Runtime code hooking and manipulation
- Device & Target App Selection - Easy selection of target Android devices and applications
- Live Stream Monitoring - Monitor Frida server logs in real-time
- Automated Setup - One-click Frida server setup and injection
Frida panel showing device selection, target apps, and live injection controls
- Syntax Highlighting - Color-coded JSON, XML, and HTML responses
- Header Analysis - View all request and response headers with values
- Timing Information - See request duration and response times
- Export Options - Export as HAR, cURL commands, Python code, or Postman collections
- Pattern Detection - Auto-detect and highlight JWT tokens, API keys, and Base64 strings
- QR Code Configuration - Simple QR code scanning for device setup
- Auto Certificate Installation - Automatic CA certificate management
- Proxy Auto-Discovery - Easy proxy configuration on Android and iOS
- Multi-Device Support - Handle multiple devices simultaneously
- Local Database - SQLite database for traffic history
- Request Filtering - Search and filter through captured requests
- Session Management - Save and restore traffic sessions
- Export to Popular Tools - Direct export to Postman, cURL, Python
| Component | Technology |
|---|---|
| Desktop Framework | Electron + Vite |
| Frontend | Vue 3 (Composition API) + TypeScript |
| Styling | TailwindCSS + PrimeVue |
| State Management | Pinia |
| Database | Better-SQLite3 |
| Certificate Generation | node-forge |
| Reverse Engineering | Frida, APK Tools, Android SDK |
| Proxy | Custom MITM implementation |
- Node.js 18+ and npm/yarn
- Android SDK (for APK patching features)
- Frida (for dynamic injection - optional)
- macOS/Windows/Linux
# Clone the repository
git clone https://github.com/danieldev23/trafexia.git
cd trafexia
# Install dependencies
npm install
# Start development server
npm run devThe application will launch with hot reload enabled for development.
# Build for current platform
npm run build
# Build for macOS (Intel)
npm run build:mac
# Build for macOS (Apple Silicon)
npm run build:mac-arm
# Build for Windows
npm run build:win
# Build for Linux
npm run build:linuxExecutables will be generated in the dist-electron/ folder.
Releases are automatically built and published when you create a version tag:
# Create and push a new release
git tag v1.0.1
git push origin v1.0.1GitHub Actions automatically handles:
- Building for macOS (Intel + Apple Silicon)
- Building for Windows
- Building for Linux
- Creating release artifacts
- Uploading to GitHub Releases
Get the latest release for your platform:
| Platform | Download | File |
|---|---|---|
| 🍎 macOS (Intel) | Download | Trafexia-x.x.x.dmg |
| 🍎 macOS (Apple Silicon) | Download | Trafexia-x.x.x-arm64.dmg |
| 🪟 Windows | Download | Trafexia-Setup-x.x.x.exe |
| 🐧 Linux | Download | Trafexia-x.x.x.AppImage |
- Launch Trafexia - Open the application
- Start the Proxy - Click the "Start Proxy" button to begin intercepting traffic
- Configure Mobile Device - Scan the QR code or manually configure proxy settings
- Install CA Certificate - Follow the setup instructions for your platform
- Capture Traffic - All HTTP/HTTPS traffic will be captured and displayed
- Open Settings → WiFi
- Long-press on your network and select Modify
- Tap Advanced options
- Set Proxy to Manual
- Enter the Proxy IP and Port (displayed in Trafexia)
- Tap Save
- Download the CA certificate from Trafexia (QR code or manual link)
- Open Settings → Security
- Tap Install from storage
- Select the downloaded certificate file
- Follow the prompts to complete installation
For apps with SSL pinning:
- In Trafexia, go to SSL Bypass tab
- Select Android and target device
- Choose your target app or use APK Patcher
- Click Inject Bypass Script or Patch APK
- Follow the on-screen instructions
- Open Settings → WiFi
- Tap the (i) icon next to your network
- Scroll down to Configure Proxy
- Select Manual
- Enter the Proxy IP and Port
- Tap Done
- Download the CA certificate using the link provided in Trafexia
- Open Settings → General → Profiles
- Tap Install to install the profile
- Go to Settings → General → About → Certificate Trust Settings
- Enable the Trafexia CA certificate
- Go to Settings → General → About
- Look for certificate trust settings
- Enable full trust for the Trafexia certificate
Capturing Requests:
- All HTTP/HTTPS requests will appear in the request list
- Click on any request to view details
- Headers, body, and response tabs show detailed information
Filtering & Searching:
- Use the search bar to find specific requests
- Filter by method (GET, POST, etc.), status code, or host
- Color-coded status codes for quick identification
Request Comparison:
- Select two requests to compare side-by-side
- See the diff in headers and response bodies
- Useful for debugging API changes
Map Rules (URL Rewriting):
- Click Map Rules tab
- Create a new rule with:
- Pattern: Regex pattern to match (e.g.,
.*api\.example\.com.*) - Method: HTTP method filter (GET, POST, ALL)
- Destination: New URL to redirect to
- Pattern: Regex pattern to match (e.g.,
- Enable/disable rules as needed
Mock Responses:
- Click Mock Rules tab
- Create a mock rule with:
- URL Pattern: Regex pattern to match
- Status Code: HTTP status (200, 404, 500, etc.)
- Response Headers: Custom headers
- Response Body: JSON, XML, or plain text response
- Matching requests will receive the mocked response
Request Throttling:
- Open Throttle Control
- Set bandwidth limits and latency
- Simulate slow network conditions
- Useful for testing app performance on poor connections
- Ensure Frida server is installed on your Android device
- Open Frida Interception Engine tab
- Click Setup Frida Server
- Select your device from the list
- Choose target application
- Click Start Bypass Injection
- View logs in the live stream panel
- Installing a CA certificate allows traffic interception on your device
- Only use this tool for development and testing on your own devices
- Never use this on production devices or without explicit permission
- Remove the CA certificate when you're done testing
- Do not use this tool for:
- Intercepting others' traffic
- Bypassing security on apps you don't own
- Any illegal or unauthorized activities
Contributions are welcome! Please feel free to submit a Pull Request.
# Clone and setup development environment
git clone https://github.com/danieldev23/trafexia.git
cd trafexia
npm install
npm run dev
# Make your changes and test thoroughly
npm run buildIf you find Trafexia helpful for your development and reverse engineering work, consider supporting the project:
This project is licensed under the MIT License - see the LICENSE file for details.
The tool is provided for educational and authorized testing purposes only. Users are responsible for compliance with local laws and regulations.
Q: Do I need a rooted/jailbroken device? A: No! Trafexia can patch APKs and inject scripts without requiring root access. However, Frida injection requires a rooted device.
Q: Can I use this on apps with certificate pinning? A: Yes! That's one of the main features. Use either APK patching or Frida injection for dynamic bypass.
Q: Is this legal? A: Yes, for testing on your own devices and authorized applications. Always respect app terms of service and local laws.
Q: Can I export captured traffic? A: Yes! Export as HAR, cURL, Python, or Postman collections.
Q: Does it work on iOS apps? A: iOS setup works for proxy interception. APK patching is Android-only, but you can use Frida on jailbroken iOS devices.
- Report Bugs: GitHub Issues
- Feature Requests: GitHub Discussions
- Discord: Coming soon!