Hackerman's Hacking Tutorials

The knowledge of anything, since all things have causes, is not acquired or complete unless it is known by its causes. - Avicenna

Thick Client Proxying

2017 Oct 8Thick Client Proxying - Part 8 - Notes on Proxying Windows Services
2017 Oct 7Thick Client Proxying - Part 7 - Proxying .NET Applications via Config File
2017 Sep 21Razer Comms
2016 Jul 28Thick Client Proxying - Part 6: How HTTP(s) Proxies Work
2016 Jun 7Windows Netsh Interface Portproxy
2016 May 15Thick Client Proxying - Part 5: FileHippo App Manager or the Bloated Hippo
2016 Apr 7Thick Client Proxying - Part 4: Burp in Proxy Chains
2016 Apr 2Thick Client Proxying - Part 3: Burp Options and Extender
2016 Mar 29Thick Client Proxying - Part 2: Burp History, Intruder, Scanner and More
2016 Mar 27Thick Client Proxying - Part 1: Burp Interception and Proxy Listeners
2015 Oct 19Proxying Hipchat Part 3: SSL Added and Removed Here :^)
2015 Oct 9Proxying Hipchat Part 2: So You Think You Can Use Burp?
2015 Oct 8Proxying Hipchat Part 1: Where did the Traffic Go?