mitmdump is the command-line version of mitmproxy, with the same functionality but without the user interface. Think tcpdump for HTTP.
- Features
- Intercept HTTP requests and responses and modify them on the fly.
- Save complete HTTP conversations for later replay and analysis.
- Replay the client-side of an HTTP conversations.
- Replay HTTP responses of a previously recorded server.
- Reverse proxy mode to forward traffic to a specified server.
- Make scripted changes to HTTP traffic using Python.
- SSL certificates for interception are generated on the fly.
The easiest way to install the latest release of mitmproxy is to use pip: pip install mitmproxy
For further instructions, see the Installation section of the documentation.
Download
- Current release source: mitmproxy 0.8
- Git Repository: github.com/cortesi/mitmproxy
- Source is hosted on github:
- github.com/cortesi/mitmproxy
Requirements
- Python 2.6.x or 2.7.x.
- PyOpenSSL 0.12 or newer.
- pyasn1 0.1.2 or newer.
- urwid version 0.9.8 or newer.
- PIL version 1.1 or newer.
- lxml version 2.3 or newer.
- The following auxiliary components may be needed if you plan to hack on mitmproxy:
- The test suite uses the pry unit testing library.
- Rendering the documentation requires countershape.
- mitmproxy is tested and developed on OSX, Linux and OpenBSD. Windows is not supported at the moment.
- You should also make sure that your console environment is set up with the following:
- EDITOR environment variable to determine the external editor.
- PAGER environment variable to determine the external pager.
- Appropriate entries in your mailcap files to determine external viewers for request and response contents.
Source -
http://mitmproxy.org/index.html
Screenshot -
http://mitmproxy.org/index.html
Screenshot -
Post a Comment