An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Go to file
dependabot[bot] 5dce2eecb3
Update pytest-xdist requirement from <3.3,>=2.1.0 to >=2.1.0,<3.4 (#6155)
Updates the requirements on [pytest-xdist](https://github.com/pytest-dev/pytest-xdist) to permit the latest version.
- [Changelog](https://github.com/pytest-dev/pytest-xdist/blob/master/CHANGELOG.rst)
- [Commits](https://github.com/pytest-dev/pytest-xdist/compare/v2.1.0...v3.3.1)

---
updated-dependencies:
- dependency-name: pytest-xdist
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-06-02 12:06:37 +02:00
.github Bump install-pinned/black (#6153) 2023-06-02 12:06:04 +02:00
docs Add example, according to issue #3752 (#6094) 2023-05-08 09:30:59 +00:00
examples solve #4272 docs bug (#6127) 2023-05-14 19:22:51 +02:00
mitmproxy re-use SNI in reverse proxy mode if the original connection was torn down (#6148) 2023-05-28 16:35:34 +00:00
release DockerHub-README.md: reword ambiguous command (#6080) 2023-04-27 08:49:15 +00:00
test re-use SNI in reverse proxy mode if the original connection was torn down (#6148) 2023-05-28 16:35:34 +00:00
web Fixed auto scroll in mitmweb (#6038) 2023-04-01 13:29:44 +02:00
.gitattributes test dumpfiles: .bin -> .mitm 2021-02-03 19:27:15 +01:00
.gitignore update kaitai definitions 2022-07-29 16:13:15 +02:00
CHANGELOG.md re-use SNI in reverse proxy mode if the original connection was torn down (#6148) 2023-05-28 16:35:34 +00:00
CONTRIBUTING.md drop support for Python 3.9 2023-02-27 08:37:11 +01:00
LICENSE GPLv3 -> MIT 2013-03-18 08:37:42 +13:00
MANIFEST.in remove pathod and pathoc 2020-12-13 20:21:11 +01:00
README.md readme: fix nits 2022-12-15 17:50:43 +01:00
SECURITY.md Create SECURITY.md 2021-09-13 16:34:33 +02:00
codecov.yml remove `release/` from coverage 2022-07-25 01:39:04 +02:00
pyproject.toml Update pytest-xdist requirement from <3.3,>=2.1.0 to >=2.1.0,<3.4 (#6155) 2023-06-02 12:06:37 +02:00
setup.cfg Switch to pyproject.toml (#6016) 2023-03-26 17:40:32 +00:00

README.md

mitmproxy

Continuous Integration Status autofix.ci: enabled Coverage Status Latest Version Supported Python versions

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

mitmdump is the command-line version of mitmproxy. Think tcpdump for HTTP.

mitmweb is a web-based interface for mitmproxy.

Installation

The installation instructions are here. If you want to install from source, see CONTRIBUTING.md.

Documentation & Help

General information, tutorials, and precompiled binaries can be found on the mitmproxy website.

mitmproxy.org

The documentation for mitmproxy is available on our website:

mitmproxy documentation stable mitmproxy documentation dev

If you have questions on how to use mitmproxy, please use GitHub Discussions!

mitmproxy discussions

Contributing

As an open source project, mitmproxy welcomes contributions of all forms.

Dev Guide

Also, please feel free to join our developer Slack! However, please note that the primary purpose of our Slack is direct communication between maintainers and contributors. If you have questions where the answer might be valuable to others, please use GitHub Discussions and not Slack.

Slack Developer Chat