{"id":3965,"date":"2016-10-10T23:05:13","date_gmt":"2016-10-10T15:05:13","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3965"},"modified":"2016-10-06T23:05:57","modified_gmt":"2016-10-06T15:05:57","slug":"mitmproxy-intercepting-http-proxy-tool-aka-mitm","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/10\/mitmproxy-intercepting-http-proxy-tool-aka-mitm\/","title":{"rendered":"mitmproxy – Intercepting HTTP Proxy Tool aka MITM"},"content":{"rendered":"

mitmproxy is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.<\/p>\n

\"mitmproxy<\/p>\n

It’s a console tool that allows interactive examination and modification of HTTP traffic. It differs from mitmdump in that all flows are kept in memory, which means that it\u2019s intended for taking and manipulating small-ish samples.<\/p>\n

The command-line companion called mitmdump provides tcpdump-like functionality to let you view, record, and programmatically transform HTTP traffic.<\/p>\n

Features<\/h3>\n