mitmproxy is an interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers.
mitmproxy allows HTTP traffic flows to be intercepted, inspected, modified and replayed.
To get started hacking on mitmproxy, make sure you have Python 2.7.x with virtualenv installed (you can find installation instructions for virtualenv here). Then do the following:
git clone https://github.com/mitmproxy/mitmproxy.git
To confirm that you’re up and running, activate the virtualenv, and run the mitmproxy test suite:
. venv/bin/activate # venv\Scripts\activate.bat on Windows
The mitmproxy documentation is build using Sphinx, which is installed automatically if you set up a development environment as described above. After installation, you can render the documentation like this: