Penetration Testing

Intercept, Inspect, Modify and Replay HTTP traffic

mitmproxy is an interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers.

mitmproxy allows HTTP traffic flows to be intercepted, inspected, modified and replayed.

To get started hacking on mitmproxy, make sure you have Python 2.7.x with virtualenv installed (you can find installation instructions for virtualenv here). Then do the following:

git clone
cd mitmproxy

To confirm that you’re up and running, activate the virtualenv, and run the mitmproxy test suite:

. venv/bin/activate # venv\Scripts\activate.bat on Windows

The mitmproxy documentation is build using Sphinx, which is installed automatically if you set up a development environment as described above. After installation, you can render the documentation like this:

cd docs
make clean
make html
make livehtml

Github page