mitmproxy
MIT๐ Network Recon ยท Python
mitmproxy is a set of tools that provide an interactive, TLS-capable intercepting proxy for HTTP/1, HTTP/2, and WebSocket traffic. It includes mitmproxy (console interface), mitmweb (browser-based interface), and mitmdump (non-interactive dumping). Traffic can be intercepted, inspected, modified, and replayed in real-time. Its Python scripting API enables complex traffic manipulation, from rewriting headers to injecting content. mitmproxy handles TLS transparently, making it invaluable for debugging encrypted API calls, mobile app traffic analysis, and security testing.
Installation
$ pip install mitmproxyUse Cases
- Intercepting and modifying HTTPS traffic in real-time
- Debugging mobile app API communications
- Automated traffic manipulation via Python scripts
- Recording and replaying HTTP sessions for testing
Tags
Details
- Category
- ๐ Network Recon
- Language
- Python
- Repository
- mitmproxy/mitmproxy
- License
- MIT
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
Burp Suite Community
JavaWeb vulnerability scanner and proxy. Intercept, modify, and replay HTTP/S traffic for web app testing.
Compare mitmproxy vs Burp Suite CommunityMore in Network Recon
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Masscan
CInternet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
RustScan
RustBlazing fast port scanner that pipes into Nmap. Scans all 65k ports in 3 seconds flat.
Shodan CLI
PythonCommand-line interface for Shodan, the search engine for internet-connected devices.
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Responder
PythonLLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.