An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Go to file
Aldo Cortesi a747043cc8 Use http.read_response to read server response.
Also add a few different output formats, and a verbosity flag.
2012-06-24 22:59:20 +12:00
doc-src Request service rendering. 2012-06-24 19:12:52 +12:00
libpathod Use http.read_response to read server response. 2012-06-24 22:59:20 +12:00
test Sketch out pathoc commandline interaction. 2012-06-24 21:10:10 +12:00
.coveragerc Port test suite over to Nose. 2012-06-09 15:08:51 +12:00
.gitignore Porting to netlib proceeds apace. 2012-06-19 13:23:07 +12:00
LICENSE setup.py, LICENSE, README.txt 2012-04-29 21:30:48 +12:00
README.mkd Documentation. 2012-06-24 10:54:37 +12:00
README.txt Documentation. 2012-06-24 10:54:37 +12:00
pathoc Use http.read_response to read server response. 2012-06-24 22:59:20 +12:00
pathod Logging truss for pathod. 2012-06-24 21:40:31 +12:00
setup.py Remove last vestige of Tornado pathod. 2012-06-21 17:00:04 +12:00
todo Fix redundant imports, tweak TODO for 0.2 2012-04-30 10:09:16 +12:00

README.txt

__pathod__ is a collection of pathological tools for testing and torturing HTTP
clients and servers. The project has three components:

- __pathod__, an pathological HTTP daemon.
- __pathoc__, a perverse HTTP client. 
- __libpathod.test__, an API for easily using __pathod__ and __pathoc__ in unit tests.


# Installing

If you already have __pip__ on your system, installing __pathod__ and its
dependencies is dead simple:
    
    pip install pathod

The project uses the __nose__ unit testing framework, which you can get here:

    FIXME