debugginghttphttp2man-in-the-middlemitmproxyproxypythonsecuritysslstarred-mitmproxy-repostarred-repotlswebsocket
4f60e52413
* keyinfo typing * Fix parsing of certificate issuer/subject with escaped special characters * tests * rfc4514_attribute_name and multi value test * pyca version + mypy happy dance * aT lEaSt tTO sPAceS BeFOre iNLinE cOMment * fix coverage Co-authored-by: Maximilian Hils <github@maximilianhils.com> |
||
---|---|---|
.github | ||
docs | ||
examples | ||
mitmproxy | ||
release | ||
test | ||
web | ||
.gitattributes | ||
.gitignore | ||
CHANGELOG.md | ||
CONTRIBUTING.md | ||
LICENSE | ||
MANIFEST.in | ||
README.md | ||
codecov.yml | ||
setup.cfg | ||
setup.py | ||
tox.ini |
README.md
mitmproxy
mitmproxy
is an interactive, SSL/TLS-capable intercepting proxy with a console
interface for HTTP/1, HTTP/2, and WebSockets.
mitmdump
is the command-line version of mitmproxy. Think tcpdump for HTTP.
mitmweb
is a web-based interface for mitmproxy.
Installation
The installation instructions are here. If you want to install from source, see CONTRIBUTING.md.
Documentation & Help
General information, tutorials, and precompiled binaries can be found on the mitmproxy website.
The documentation for mitmproxy is available on our website:
If you have questions on how to use mitmproxy, please ask them on StackOverflow!
Contributing
As an open source project, mitmproxy welcomes contributions of all forms.
Also, please feel free to join our developer Slack!