An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Go to file
Aldo Cortesi fde65270af Testing examples and docs. 2012-07-30 20:58:59 +12:00
.sources Testing examples and docs. 2012-07-30 20:58:59 +12:00
libpathod Testing examples and docs. 2012-07-30 20:58:59 +12:00
test Testing examples and docs. 2012-07-30 20:58:59 +12:00
.coveragerc Port test suite over to Nose. 2012-06-09 15:08:51 +12:00
.gitignore Allow naked literals for path specification. 2012-06-29 10:42:15 +12:00
LICENSE setup.py, LICENSE, README.txt 2012-04-29 21:30:48 +12:00
README.mkd README.txt and README.mkd tweaks. 2012-07-29 15:49:26 +12:00
README.txt README.txt and README.mkd tweaks. 2012-07-29 15:49:26 +12:00
pathoc pathod: handle keyboard interrupts and SSL errors. 2012-07-22 12:49:59 +12:00
pathod Listen on localhost by default. 2012-07-29 17:29:38 +12:00
setup.py Add netlib dependency pointer. 2012-06-28 16:17:45 +12:00

README.txt

**pathod** is a collection of pathological tools for testing and torturing HTTP
clients and servers. The project has three components:

- **pathod**, an pathological HTTP daemon.
- **pathoc**, a perverse HTTP client. 
- **libpathod.test**, an API for easily using pathod and pathoc in unit tests.


Documentation
-------------

The pathod documentation is self-hosted. Just fire up pathod, like so:
    
    ./pathod 

And then browse to:

    http://localhost:9999

You can aways view the documentation for the latest release at the pathod
website:
    
    http://pathod.net


Installing
----------

If you already have **pip** on your system, installing **pathod** and its
dependencies is dead simple:
    
    pip install pathod

The project has the following dependencies:

* netlib_
* requests_

The project's test suite uses the nose_ unit testing framework.

.. _netlib: http://github.com/cortesi/netlib
.. _requests: http://docs.python-requests.org/en/latest/index.html 
.. _nose: http://nose.readthedocs.org/en/latest/