Proxy
VirtuProbe includes a built-in SOCKS5 MITM proxy that sits between your client and the target server. A DevTools-style UI lets you inspect every request and response in real time — including raw bodies, decompressed payloads, and binary frames.
[SCREENSHOT: Proxy view — split panel with exchange list on left, detail (headers + body) on right]
Starting the proxy
Section titled “Starting the proxy”[SCREENSHOT: Proxy panel with host/port settings and Start button]
Configure the local host and port the proxy should listen on, then click Start. Point your client’s SOCKS5 proxy settings at that address.
| Field | Default |
|---|---|
| Host | localhost |
| Port | 8888 |
Inspecting exchanges
Section titled “Inspecting exchanges”Each TCP exchange appears in the list as it flows through the proxy. Click an entry to inspect it.
[SCREENSHOT: Exchange detail — request bytes on left, response bytes on right, hex/text toggle]
The detail panel shows:
- Request — raw bytes sent by the client
- Response — raw bytes returned by the server
- Direction and timestamp for each chunk
Body decompression
Section titled “Body decompression”[SCREENSHOT: Decompress button and decompressed body panel]
Compressed response bodies (gzip, deflate, Brotli) can be decompressed server-side. Click Decompress on an exchange to see the readable payload. All three encodings are supported, including Brotli which browsers cannot decompress natively via the standard API.
SSL/TLS traffic
Section titled “SSL/TLS traffic”The proxy can handle SSL connections. For HTTPS interception, configure your client to trust the proxy’s certificate.