Dexterceptor is a powerful tool for developers and researchers designed to intercept HTTP(S) requests directly inside Android applications, even when they are obfuscated.
It is based on Xposed / LSPosed and deeply integrates with OkHttp, featuring a built-in SSL bypass, a rule system, and an extensible architecture for future interception types.
Dexterceptor integrates into the application’s networking stack and provides real-time access to:
A flexible rule system enables automatic transformation of network traffic:
Dexterceptor can disable:
This enables full visibility of traffic in external tools such as:
The architecture is designed for future extensibility.
Planned capabilities include interception of:
setText()Dexterceptor is evolving into a universal runtime inspector for Android applications.
✔️ OkHttp interception
✔️ HTTP data viewing and storage
✔️ request/response modification
✔️ SSL bypass
✔️ EventBusRx for transferring large logs between processes
⏳ system method interception (setText, SQLite, Binder)
⏳ advanced rule/script editor
com.winnersonx.httpinterceptor
Release Type: Stable
2/1/2026, 12:47:37 AM
Release Type: Stable
2/1/2026, 12:47:37 AM
Added "Declaring class" and "Return type" option to method and field members.
Added "readers" and "writers" options to class members
Added access icon to members (like public or private)
Fixed field name
Field and method names are colorified now