Android Device & Emulator

How to install Proxyman Certificate on Android Devices

In order to capture and decrypt HTTP/HTTPS request/response from your physical Android Devices or Android Emulators, please navigate to:

  • Certificate Menu -> Install Certificate on Android -> Device

  • Certificate Menu -> Install Certificate on Android -> Emulator

For the Android Emulator, let's check out the Automatic Script for Android Emulator

1. Android Setup Guide

If you want to capture & decrypt HTTP/HTTPS Traffic from your Physical or Emulator Android Device, please follow all steps in the setup guide:

  1. Certificate Menu -> Install Certificate on Android -> Device

  2. Install Root Proxyman Certificate on your machine: You can follow the macOS Guide.

  3. Get your Android Device or Emulator -> Open Setting app -> Wifi -> Select the current Wifi -> Config the HTTP Proxy by following the next tables.


Server IP

Your current IP Network


The current port of Proxyman: 9090 is the default



Some Samsung devices couldn't access the Internet after setting the HTTP Proxy. Please try to forget your current network and connect again.

If you're using any VPN app, please make sure to close it, since some VPN apps conflict with HTTP/HTTPS Proxy configs.

3. Open from the native web browser on your Android Devices in order to install the Proxyman Certificate.

Android 11, Android 12 or later:

  • Visit from the Google Chrome app to download the certificate.

  • From Android 11 or later, you have to manually install the certificate in the Setting app.

  • Settings app -> Security -> Encryption & Credentials -> Install a Certificate -> Selec "CA Certificate" -> Select Proxyman CA Certificate in your storage.

Android 10 and below:

  • As soon as you visit, your Android devices will download and install it automatically. Make sure you select the VPN and App Section.

On Android 12+, If you encounter this warning "Can't install the Certificate: This file can't be used as a VPN & app user certificate", please try to select "CA Certificate" instead.

Ref: is a local website, which serves from the local Proxyman's HTTP server. If you couldn't open it, please forget the wifi, re-connect and make sure the Proxyman app is opening.

4. On Android 11 and Android 12. Let's verify by opening the Trusted Credentials -> User Tab.

Make sure you can see the Proxyman CA Certificate like the below screenshot.

5. Open your app Source Code: Adding the two following xml files.

  • Add res/xml/network_security_config.xml

      <!-- Trust user added CAs while debuggable only -->
      <certificates src="user" />
      <certificates src="system" />

  <base-config cleartextTrafficPermitted="true">
      <certificates src="system" />
      <certificates src="user" />
  • Add to AndroidManifest.xml

<?xml version="1.0" encoding="utf-8"?>
<manifest ... >
    <application android:networkSecurityConfig="@xml/network_security_config" ... >

Find more information at Network Security Configuration

Make sure that you remove those configs in the Release build. If not, your HTTP/HTTPS requests can be intercepted and leak your sensitive data in the Production build.

6. If it's Android Emulator, please restart the emulator

7. Done ✅

2. Troubleshooting

Please check out this troubleshooting section.

3. Sample Android Project

If you've struggled to config XML settings, let's check out this simple project that we've configured:

Github Link:

pageSample Android Project

4. React Native Android app

If you're using React Native for the Android app, please check out the React Native Page.

5. Intercept Traffic from embedding WebView

Some Android apps have embedded WebView that requires extra steps in order to intercept HTTPS traffic.

  1. Make sure you're able to see other HTTPS traffic from your Android app. It means that you've set up the certificate properly

  2. Inject the following code to your WebView


// The following two lines help with disabling asset caching

3. Open a new Chrome tab on your computer and navigate to chrome://inspect

4. When you open the WebView, the view will appear in your Chrome tab, then you can simply click inspect to start using the remote debugger.

6. SSL Proxying using Root Device

Credit for Shirshak

If your Android version is below 7 you don't need to do this step. Google added extra security that doesn't allow man-in-middle-app to attack after Android 6. i.e unable to do MITM attack on android apps.

We don't bear any responsibility for problems due to rooting phones. So please follow the guide at your own risk.

  1. Root your phone with magisk framework.

  2. Install the Root file browser so you can copy and paste files in a restricted system folder.

  3. Type the following script in the command line

    $ cd ~/.proxyman
    // We copy certificate to another file name just so we may need it later
    $ cp proxyman-ca.pem temp.pem
    $ hash=$(openssl x509 -inform PEM -subject_hash_old -in temp.pem | head -1)
    $ mv temp.pem "$hash.0"
  4. If you go to ~/.proxyman folder you must notice a file name starting with numbers with extension

  5. Copy that file to your Andriod.

  6. Using root file browser transfer that file to /system/etc/security/cacerts/

  7. Enjoy proxying.

  1. When using Andriod phones, set the gateway to any wrong IP just so you can be sure all your traffic goes from proxy man proxy only.

  2. We can use the macOS sharing feature to create a mobile hotspot. And from an Android phone, you can use Proxyman proxy easily. It is much better because sometimes the router can block requests between mobile and macOS.

Addition resources

Last updated