mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-30 03:14:22 +00:00
afbb7f117b
Found via `codespell -q 3 -I ../mitmproxy-word-whitelist.txt` Where whitelist contains: ``` cas doubleclick nd ot seeked statics te thru ```
19 lines
2.0 KiB
Markdown
19 lines
2.0 KiB
Markdown
## Complex Examples
|
|
|
|
| Filename | Description |
|
|
|:-------------------------|:----------------------------------------------------------------------------------------------|
|
|
| change_upstream_proxy.py | Dynamically change the upstream proxy. |
|
|
| dns_spoofing.py | Use mitmproxy in a DNS spoofing scenario. |
|
|
| dup_and_replay.py | Duplicates each request, changes it, and then replays the modified request. |
|
|
| full_transparency_shim.c | Setuid wrapper that can be used to run mitmproxy in full transparency mode, as a normal user. |
|
|
| har_dump.py | Dump flows as HAR files. |
|
|
| mitmproxywrapper.py | Bracket mitmproxy run with proxy enable/disable on OS X |
|
|
| nonblocking.py | Demonstrate parallel processing with a blocking script |
|
|
| remote_debug.py | This script enables remote debugging of the mitmproxy _UI_ with PyCharm. |
|
|
| sslstrip.py | sslstrip-like functionality implemented with mitmproxy |
|
|
| stream.py | Enable streaming for all responses. |
|
|
| stream_modify.py | Modify a streamed response body. |
|
|
| tcp_message.py | Modify a raw TCP connection |
|
|
| tls_passthrough.py | Use conditional TLS interception based on a user-defined strategy. |
|
|
| xss_scanner.py | Scan all visited webpages. |
|