MITM Proxy Tool

BBEye

Intercept, decrypt, and analyze network traffic across every protocol. Built for reverse engineers and security researchers.

HTTP/HTTPS WebSocket gQUIC IETF QUIC UDP SOCKS5
👁

Full Protocol Capture

Capture and inspect all traffic in real-time. Tree-structured session list, JSON syntax highlighting with 20+ color themes, and intelligent content rendering for headers, forms, protobuf, and hex.

Tree view JSON themes Protobuf decode Hex viewer
BBEye traffic capture interface

Dual-Mode Proxy

SOCKS5 and HTTP proxy in one. The mixed port mode routes both TCP and UDP connections through BBEye, enabling QUIC and UDP traffic interception that traditional HTTP proxies miss entirely.

SOCKS5 HTTP Proxy Mixed Port UDP Relay
Proxy settings
🔒

QUIC Decryption

Full decryption of gQUIC (Q043/Q046/Q050) and IETF QUIC. Three-phase key derivation: initial, diversified, and forward-secure. HTTP/2 stream reassembly with HPACK header decompression.

gQUIC Q043/Q046 IETF QUIC HKDF AES-128-GCM
QUIC protocol decryption
🔓

Decrypted HTTPS Data

After key import and stream reassembly, gQUIC traffic is fully decoded into standard HTTPS sessions. JSON responses are pretty-printed with syntax highlighting and searchable in the viewer.

JSON viewer Brotli decode H2 → HTTPS
Decrypted HTTPS data from gQUIC
🔑

Key Log Manager

Import NSS Key Log files or receive keys in real-time via Frida hooks. Supports TLS 1.2 CLIENT_RANDOM, TLS 1.3 traffic secrets, and all gQUIC key phases including diversified and forward-secure keys.

NSS Key Log Frida hook Real-time import
Key Log management panel

Python Script Decryption

Write custom Python scripts to decrypt encrypted API responses. URL pattern matching, environment variable injection, and real-time reload on file change.

Before
Encrypted traffic before decryption
After
Decrypted traffic after script processing
📜

Script Manager

Manage decrypt scripts with @match URL patterns, conflict detection, and environment variable dependencies. Scripts auto-reload on file change — no restart required.

@match patterns Hot reload Env vars
Script management interface
🤖

Agent Skills

Built-in skill packs for Claude Code, Cursor, and Codex. One-click install lets AI agents consume captured traffic in real-time via the live directory API at ~/.bbeye/live/.

Claude Code Cursor Codex Live API
AI Agent skill integration
📂

Project Management

Isolate work by project. Each project has its own set of environment variables passed to decrypt scripts. Switch between projects instantly.

Multi-project Env isolation Quick switch
Project management
🔍

Advanced Filtering

Filter sessions by host, path, method, status code, content type, duration, and response size. Supports HTTP, HTTPS, WebSocket, QUIC, gQUIC, and UDP protocol filtering.

Multi-dimension Status codes Content-Type Duration
Advanced session filtering
🏫

BBEye Store

Community-driven script marketplace. Share and discover decrypt scripts, Frida hooks, plugins, and AppData configurations. Search by app name, package, or platform.

Scripts Frida hooks Plugins AppData
BBEye Store interface

Technical Highlights

🔐

gQUIC 3-Phase Keys

Initial, diversified (HKDF + nonce), and forward-secure key derivation. Full AES-128-GCM decryption pipeline.

📈

HTTP/2 Stream Reassembly

HPACK header decompression, stream offset tracking, and multi-frame DATA reassembly for complete request/response reconstruction.

📦

Auto Decompression

Automatic Brotli, gzip, and deflate decompression based on Content-Encoding headers. Transparent to scripts and viewers.

🎨

20+ JSON Themes

Xcode Dark, Monokai, Dracula, Nord, Cyberpunk, and more. RSyntaxTextArea-powered rendering with sub-300ms load for 2MB+ JSON.

🚀

Live Directory Export

Real-time session export to ~/.bbeye/live/ with atomic index.json writes. Designed for AI agent consumption and external tool integration.

💾

.eye File Format

ZIP-based session archive preserving all metadata, request/response bodies, QUIC packets, WebSocket frames, and key log entries.