Skip to main content
Glama

intercept_android_adb

Intercept HTTP(S) traffic from Android devices via ADB for debugging. Automatically injects HTTPS certificates into rooted devices and emulators to monitor network activity.

Instructions

Intercept HTTP(S) traffic from an Android device or emulator connected via ADB. Automatically injects system HTTPS certificates into rooted devices and most emulators.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
proxyPortYesProxy port to route traffic through
deviceIdYesADB device ID. Use get_interceptor_metadata with id "android-adb" to list connected devices.
enableSocksNoEnable SOCKS proxy support (default: false)

Implementation Reference

  • The tool 'intercept_android_adb' is registered in src/index.ts. The handler calls `client.activateInterceptor` with 'android-adb' as the interceptor type.
    server.registerTool(
      'intercept_android_adb',
      {
        title: 'Intercept Android Device via ADB',
        description: 'Intercept HTTP(S) traffic from an Android device or emulator connected via ADB. Automatically injects system HTTPS certificates into rooted devices and most emulators.',
        inputSchema: z.object({
          proxyPort: z.number().describe('Proxy port to route traffic through'),
          deviceId: z.string().describe('ADB device ID. Use get_interceptor_metadata with id "android-adb" to list connected devices.'),
          enableSocks: z.boolean().optional().describe('Enable SOCKS proxy support (default: false)'),
        }),
      },
      async ({ proxyPort, deviceId, enableSocks }) =>
        jsonResult(await client.activateInterceptor('android-adb', proxyPort, { deviceId, enableSocks }))
    );

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/fdciabdul/httptoolkit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server