debugginghttphttp2man-in-the-middlemitmproxyproxypythonsecuritysslstarred-mitmproxy-repostarred-repotlswebsocket
2af6dcf6f7 | ||
---|---|---|
doc-src | ||
examples | ||
libmproxy | ||
test | ||
.gitignore | ||
CHANGELOG | ||
LICENSE | ||
MANIFEST.in | ||
README.mkd | ||
mitmdump | ||
mitmproxy | ||
setup.py | ||
todo |
README.mkd
mitmproxy and mitmdump are SSL-capable, intercepting HTTP proxies.
mitmproxy provides a curses interface that allows traffic to be inspected and edited on the fly.
mitmdump is the command-line companion of mitmproxy - like tcpdump for HTTP.
Capabilities
- Intercept HTTP requests and responses and modify them on the fly.
- Save complete HTTP conversations for later replay and analysis.
- Client replay to replay the client-side of an HTTP conversation.
- Server replay replays the HTTP responses of a previously recorded server.
- Make scripted changes to HTTP traffic using a simple Python API.
- Dummy SSL certificate authority creates interception certificates on the fly.
Download
Releases can be found here: http://corte.si/projects.html
Source is hosted here: http://github.com/cortesi/mitmproxy
Requirements
- A recent Python interpreter.
- SSL certificates are generated using openssl
- The curses interface relies on version 0.9.8 or newer of the urwid library.
- The test suite uses the pry unit testing library.
You should also make sure that your console environment is set up with the following:
- EDITOR environment variable to determine the external editor.
- PAGER environment variable to determine the external pager.
- Appropriate entries in your mailcap files to determine external viewers for request and response contents.