This project provides automation scripts to simplify the process of configuring Android devices (emulator or physical) to proxy HTTP/S traffic through Burp Suite for security testing or debugging.
mobileconfig.sh
: Automates configuration of Burp Certificte to capture traffic via Burp Suite.set_proxy.sh
: Enables or disables the proxy settings on the Android device without manual navigation.
- Burp Suite must be running and configured to listen on all interfaces.
- An Android device (either emulator or physical) must be connected to your machine.
- Ensure ADB (Android Debug Bridge) is properly installed and accessible from your terminal.
git clone https://github.com/yourusername/android-proxy-config.git
cd android-proxy-config
This script configures the Android device to route all traffic through Burp Suite.
chmod +x mobileconfig.sh
./mobileconfig.sh
π‘ Tip: This eliminates the need for manual proxy setup on the Android device.
This script allows you to toggle proxy settings on and off.
chmod +x set_proxy.sh
./set_proxy.sh set
./set_proxy.sh unset
Make sure your Burp Suite proxy is configured like this:
If you're unable to intercept Google traffic or system-level requests:
-
Check that your Burp Suite is listening on all interfaces.
-
Replace the hardcoded IP address
172.17.0.1
in the scripts with your actual machine's IP address as shown in Burp. -
Restart your device and re-run the script if changes donβt take effect.
Feel free to fork, modify, and contribute. Happy hacking!