Intercept, Inspect, Modify and Replay HTTP traffic

mitmproxy is an interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers.

mitmproxy allows HTTP traffic flows to be intercepted, inspected, modified and replayed.

Installation
To get started hacking on mitmproxy, make sure you have Python 2.7.x with virtualenv installed (you can find installation instructions for virtualenv here). Then do the following:

git clone https://github.com/mitmproxy/mitmproxy.git
cd mitmproxy
./dev.sh

To confirm that you’re up and running, activate the virtualenv, and run the mitmproxy test suite:

. venv/bin/activate # venv\Scripts\activate.bat on Windows
py.test

Documentation
The mitmproxy documentation is build using Sphinx, which is installed automatically if you set up a development environment as described above. After installation, you can render the documentation like this:

cd docs
make clean
make html
make livehtml

Github page
https://github.com/mitmproxy/mitmproxy

Categories: Penetration Testing Tags: , , ,
%d bloggers like this: