Tool
CLI
Penetration Testing & Red Teaming

mitmproxy

by mitmproxy

41.9Kstars
4.4Kforks
620watchers
Updated 19 days ago
About

mitmproxy is an interactive, TLS-capable intercepting HTTP proxy that enables real-time inspection and modification of HTTP, HTTP/2, and WebSocket traffic.

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Primary Use Case

mitmproxy is primarily used by penetration testers and software developers to intercept, inspect, and manipulate network traffic for security testing and debugging purposes. It allows users to analyze encrypted traffic and test API security by acting as a man-in-the-middle proxy. The tool is suitable for scenarios involving network monitoring, exploitation, and API security validation.

Key Features
  • Interactive console interface for HTTP/1, HTTP/2, and WebSockets
  • SSL/TLS-capable intercepting proxy
  • Command-line version (mitmdump) for scripting and automation
  • Web-based interface (mitmweb) for easier traffic inspection
  • Supports real-time traffic interception and modification
  • Extensive documentation and community support
  • Continuous integration and code coverage monitoring
  • Supports multiple Python versions

Installation

  • Visit https://docs.mitmproxy.org/stable/overview-installation for detailed instructions
  • Install via pip: pip install mitmproxy
  • For source installation, refer to CONTRIBUTING.md in the repository

Usage

>_ mitmproxy

Launches the interactive console interface for intercepting and modifying HTTP/1, HTTP/2, and WebSocket traffic.

>_ mitmdump

Runs the command-line version of mitmproxy, useful for scripting and automated traffic capture similar to tcpdump but for HTTP.

>_ mitmweb

Starts the web-based interface for mitmproxy, providing a graphical UI for traffic inspection and manipulation.

Security Frameworks
Reconnaissance
Initial Access
Execution
Command and Control
Defense Evasion
Usage Insights
  • Integrate mitmproxy with vulnerability scanners like Nessus to validate findings and exploit discovered weaknesses.
  • Use mitmproxy's scripting capabilities to automate security tests and inject malicious payloads for penetration testing.
  • Combine mitmproxy with Burp Suite for comprehensive web application security testing and exploit development.
  • Leverage mitmproxy for network traffic analysis to identify anomalous behavior and potential security threats.
  • Deploy mitmproxy in a continuous integration/continuous delivery (CI/CD) pipeline to perform security checks during the development process.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about mitmproxy. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team70%
Purple Team80%
Details
LicenseMIT License
LanguagePython
Open Issues3622
Topics
python
security
man-in-the-middle
tls
ssl
http
http2
websocket
proxy
debugging