
36.35 MB
Android 11.0+
8
x86_64, arm64-v8a, armeabi-v7a, x86
Verified safeScanned with ClamAV, APKiD, and Quark-Engine. No threats detected.
Description
Android app that intercepts and decrypts local Home Connect appliance traffic by spoofing mDNS and proxying WebSocket connections.
How it works
HomeCap discovers Home Connect appliances on the local network via mDNS (_homeconnect._tcp.local.), then redirects the official Home Connect app's traffic through a local proxy by spoofing mDNS responses. The proxy relays WebSocket frames bidirectionally while optionally decrypting and logging the payload.
Supported protocols
Mode Port Encryption Proxy class
AES 80 AES-256-CBC with HMAC-SHA256 chain WebSocketProxy
TLS 443 TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 (TLSv1.2) TlsPskProxy
Features
mDNS discovery of Home Connect appliances on the local network
mDNS spoofing (reactive + proactive) redirects only the selected appliance
WebSocket MITM proxy with transparent handshake forwarding
AES-CBC decryption with per-session decryptor (CBC state isolation)
TLS-PSK MITM using Conscrypt for ECDHE_PSK_WITH_CHACHA20_POLY1305
VPN-based NAT fallback for clients with cached DNS entries
Live notification with green icon on active connection, vibration on first connect, message/session counters
JSON export of decoded messages to Downloads/
Profile import from Home Connect Profile Downloader ZIP files
Credential persistence per appliance in SharedPreferences
Usage
Start the app -- mDNS discovery begins automatically
Select an appliance from the discovery list
Enter credentials (AES key/IV or TLS PSK) or load from a Profile Downloader ZIP
Start Capture -- the proxy starts, mDNS spoofing activates, VPN NAT is established
Open the Home Connect app -- traffic is intercepted and decoded in real time
Export captured messages as JSON to the Downloads folder
Rate this app
Ratings & reviews
No reviews yet.