An interactive TLS-capable intercepting HTTP proxy for penetration testing and software development.
mitmproxy is an interactive, TLS-capable intercepting HTTP proxy that allows users to inspect, modify, and debug HTTP/1, HTTP/2, and WebSocket traffic. It solves the problem of analyzing encrypted network communications by providing tools to intercept and decrypt HTTPS traffic for security testing and development purposes.
Penetration testers, security researchers, and software developers who need to analyze and manipulate HTTP traffic for debugging, security assessment, or protocol development.
Developers choose mitmproxy for its comprehensive feature set including TLS interception, multiple interface options, and support for modern web protocols, all available as free, open-source tools with an active community.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides a keyboard-driven console for real-time inspection and manipulation of HTTP traffic, allowing rapid debugging without leaving the terminal, as emphasized in the README's feature list.
Decrypts HTTPS traffic by generating a custom CA certificate, enabling detailed analysis of encrypted communications for security testing, a core capability highlighted in the project description.
Offers console (mitmproxy), command-line (mitmdump), and web-based (mitmweb) interfaces, catering to different workflow preferences, as detailed in the README's overview of tools.
Allows capturing network sessions to files and replaying them later, useful for regression testing and scenario-based analysis, a key feature mentioned in the extracted information.
Intercepting SSL/TLS requires installing and trusting a custom CA certificate, which can be cumbersome on mobile devices or in restricted environments, adding overhead for initial setup.
Focused solely on HTTP/1, HTTP/2, and WebSockets; lacks native support for other modern protocols like gRPC or MQTT, restricting its utility for broader network analysis.
While extensible via Python scripts, writing custom addons requires knowledge of mitmproxy's API and programming skills, which may deter users seeking plug-and-play solutions.