You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our V1 tests for Android and iOS have a paragraph about this
Interception proxies like Burp and OWASP ZAP will show HTTP(S) traffic only. You can, however, use a Burp plugin such as Burp-non-HTTP-Extension or the tool mitm-relay to decode and visualize communication via XMPP and other protocols.
NoPE Proxy serves as a Burp Suite Extension designed for proxying Non-HTTP Traffic.
Link: https://github.com/summitt/Nope-Proxy
The text was updated successfully, but these errors were encountered: