Incept53 is a DNS spoofing server that redirects all DNS queries to a user-defined IP address. This tool is particularly useful for intercepting traffic from mobile applications that bypass system proxy settings This project is inspired by propellerhead410/Intercept53. I created a command-line (CLI) version here.
- https://github.com/jjogal/Android/tree/master/flutter-test-apps
- https://github.com/propellerhead410/Intercept53/tree/main/Labs
- ✅ Spoofs all incoming DNS requests to a configurable IP
- 🎯 Targets mobile apps that bypass proxy (e.g., Flutter)
- 🔧 Works with Burp Suite Community & Professional editions
- 🧪 Helpful for testing transparent proxy and MITM scenarios
- Burp Suite (Community or Pro)
- CMD/Terminal
- Bind port 8080, 80, and 443 to all interfaces
- Enable ✅ Support invisible proxying for both ports
- python Incept53.py
- select your ip
- Download DNS Changer in PlayStore for android, for iOS can you change DNS server in wifi setting
- Set your mobile device’s DNS to the IP address of your Burp Suite machine
- Install Burp’s CA certificate on your mobile to allow HTTPS interception
- Check in Burpsuite tool intercepting traffic





