SoftDroids.net » Windows » Network » WPE Pro

WPE Pro

0
WPE Pro
Download
Category: Network
System: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Program Status: Free
Looking at the file: 1 582

Description

WPE Pro is a Windows application for intercepting and editing data packets sent by specific processes. It can be used to test applications and hack multiplayer games. The utility is portable and all features are available without installation.

Packet Interception

Before you start, you need to deactivate the security software, as the activity will be blocked. To start data interception, you need to click on the Target program icon in the main program window and, when prompted, specify the executable file you want to control. It is possible to edit selected packages. This allows you to make necessary changes to the data set before sending it to an external server. This feature allows you to get additional opportunities in multiplayer games. A convenient editor is used for editing, in which you need to open the captured packet. After saving the data, a new version of the packet will be sent to the server. You can specify the delay time, port and IP. A separate panel allows you to view the overall statistics of received and sent data. The report can be uploaded to a file for further study.

Filters

To narrow down the selection of a set of packages, you can use filters that can use different parameters. There is a search mode by package name. There is a function to automatically change the contents of a package based on a certain template. For this purpose, the Modify section is used, where a new value should be entered. After making the necessary settings, they can be saved as a file for use on other devices, it will be enough to run the import and specify the correct file. A separate parameter allows you to limit the length of the checked packet.

Features

  • the utility allows you to intercept and correct data packets;
  • can be used for testing software and hacking various games;
  • data spoofing occurs at the TCP protocol level;
  • the program can be used for free.
Screenshots
Comments (0)
Commenting
Comment
Copying of any of our materials is FORBIDDEN!
Feedback
Copyright 2024