mitmproxy/README.mkd

78 lines
2.6 KiB
Markdown
Raw Normal View History

__mitmproxy__ is an interactive, SSL-capable man-in-the-middle proxy for HTTP
with a console interface.
2011-02-20 23:11:41 +00:00
__mitmdump__ is the command-line version of mitmproxy. Think tcpdump for HTTP.
__libmproxy__ is the library that mitmproxy and mitmdump are built on.
2011-03-17 20:04:49 +00:00
Complete documentation and a set of practical tutorials is included in the
distribution package, and is also available at
[mitmproxy.org](http://mitmproxy.org).
2010-02-16 05:25:03 +00:00
Features
--------
2010-02-16 05:25:03 +00:00
2011-03-15 22:09:10 +00:00
- Intercept HTTP requests and responses and modify them on the fly.
- Save complete HTTP conversations for later replay and analysis.
2011-03-17 20:04:49 +00:00
- Replay the client-side of an HTTP conversations.
2011-03-18 22:26:51 +00:00
- Replay HTTP responses of a previously recorded server.
2012-02-20 23:32:56 +00:00
- Reverse proxy mode to forward traffic to a specified server.
- Transparent proxy mode on OSX and Linux.
2012-12-09 21:57:11 +00:00
- Make scripted changes to HTTP traffic using Python.
2011-03-18 22:26:51 +00:00
- SSL certificates for interception are generated on the fly.
- And much, much more.
2011-01-24 21:59:50 +00:00
2010-02-16 05:25:03 +00:00
Download
2011-03-19 06:47:19 +00:00
--------
2010-02-16 04:09:07 +00:00
Releases and documentation can be found on the mitmproxy website:
2010-02-16 04:09:07 +00:00
2011-03-19 06:47:19 +00:00
[mitmproxy.org](http://mitmproxy.org)
2012-12-09 21:57:11 +00:00
Source is hosted on github:
2011-03-19 06:47:19 +00:00
[github.com/cortesi/mitmproxy](http://github.com/cortesi/mitmproxy)
2010-02-16 04:09:07 +00:00
Community
---------
Come join us in the #mitmproxy channel on the OFTC IRC network
(irc://irc.oftc.net:6667).
We also have a mailing list, hosted here:
[groups.google.com/group/mitmproxy](http://groups.google.com/group/mitmproxy)
2010-02-16 04:09:07 +00:00
Requirements
2011-03-19 06:47:19 +00:00
------------
2010-02-16 04:09:07 +00:00
* [Python](http://www.python.org) 2.7.x.
* [PyOpenSSL](http://pypi.python.org/pypi/pyOpenSSL) 0.13 or newer.
* [pyasn1](http://pypi.python.org/pypi/pyasn1) 0.1.2 or newer.
* [urwid](http://excess.org/urwid/) version 1.1 or newer.
* [PIL](http://www.pythonware.com/products/pil/) version 1.1 or newer.
2012-04-09 03:15:41 +00:00
* [lxml](http://lxml.de/) version 2.3 or newer.
* [netlib](http://pypi.python.org/pypi/netlib) 0.2.2 or newer.
2012-04-09 03:15:41 +00:00
The following auxiliary components may be needed if you plan to hack on
mitmproxy:
* The test suite uses the [nose](http://readthedocs.org/docs/nose/en/latest/) unit testing
framework and requires [human_curl](https://github.com/Lispython/human_curl) and
[pathod](http://pathod.org).
* Rendering the documentation requires [countershape](http://github.com/cortesi/countershape).
2012-04-09 03:15:41 +00:00
__mitmproxy__ is tested and developed on OSX, Linux and OpenBSD. Windows is not
supported at the moment.
2010-02-16 04:09:07 +00:00
You should also make sure that your console environment is set up with the
2012-12-09 21:57:11 +00:00
following:
2010-02-16 04:09:07 +00:00
* EDITOR environment variable to determine the external editor.
* PAGER environment variable to determine the external pager.
* Appropriate entries in your mailcap files to determine external
viewers for request and response contents.