mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-21 22:58:24 +00:00
b06fb6d157
This commit fixes GHSA-gcx2-gvj7-pxv3 by making mitmproxy reject header names that contain whitespace characters by default. A new `validate_inbound_headers` option is provided to turn this behavior off at the expense of allowing HTTP smuggling vulnerabilities. |
||
---|---|---|
.github | ||
docs | ||
examples | ||
mitmproxy | ||
release | ||
test | ||
web | ||
.gitattributes | ||
.gitignore | ||
CHANGELOG.md | ||
codecov.yml | ||
CONTRIBUTING.md | ||
LICENSE | ||
MANIFEST.in | ||
README.md | ||
SECURITY.md | ||
setup.cfg | ||
setup.py | ||
tox.ini |
mitmproxy
mitmproxy
is an interactive, SSL/TLS-capable intercepting proxy with a console
interface for HTTP/1, HTTP/2, and WebSockets.
mitmdump
is the command-line version of mitmproxy. Think tcpdump for HTTP.
mitmweb
is a web-based interface for mitmproxy.
Installation
The installation instructions are here. If you want to install from source, see CONTRIBUTING.md.
Documentation & Help
General information, tutorials, and precompiled binaries can be found on the mitmproxy website.
The documentation for mitmproxy is available on our website:
If you have questions on how to use mitmproxy, please use GitHub Discussions!
Contributing
As an open source project, mitmproxy welcomes contributions of all forms.
Also, please feel free to join our developer Slack!