An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Go to file
Aldo Cortesi eb43291b3c Note that pauses are skipped during previews. 2012-07-25 12:49:22 +12:00
libpathod Note that pauses are skipped during previews. 2012-07-25 12:49:22 +12:00
test Note that pauses are skipped during previews. 2012-07-25 12:49:22 +12:00
.coveragerc Port test suite over to Nose. 2012-06-09 15:08:51 +12:00
.gitignore Allow naked literals for path specification. 2012-06-29 10:42:15 +12:00
LICENSE setup.py, LICENSE, README.txt 2012-04-29 21:30:48 +12:00
README.mkd Documentation. 2012-06-24 10:54:37 +12:00
README.txt Documentation. 2012-06-24 10:54:37 +12:00
pathoc pathod: handle keyboard interrupts and SSL errors. 2012-07-22 12:49:59 +12:00
pathod Add option to specify craft anchor point. 2012-07-24 21:51:43 +12:00
setup.py Add netlib dependency pointer. 2012-06-28 16:17:45 +12:00

README.txt

__pathod__ is a collection of pathological tools for testing and torturing HTTP
clients and servers. The project has three components:

- __pathod__, an pathological HTTP daemon.
- __pathoc__, a perverse HTTP client. 
- __libpathod.test__, an API for easily using __pathod__ and __pathoc__ in unit tests.


# Installing

If you already have __pip__ on your system, installing __pathod__ and its
dependencies is dead simple:
    
    pip install pathod

The project uses the __nose__ unit testing framework, which you can get here:

    FIXME