mitmproxy/examples/complex
Maximilian Hils c90405253a remove stickycookie example
The recommended way to do this is mitmproxy/addons/stickycookie.py
2016-11-21 02:46:25 +01:00
..
change_upstream_proxy.py organize examples 2016-11-21 02:28:10 +01:00
dns_spoofing.py organize examples 2016-11-21 02:28:10 +01:00
dup_and_replay.py organize examples 2016-11-21 02:28:10 +01:00
flowbasic.py organize examples 2016-11-21 02:28:10 +01:00
full_transparency_shim.c organize examples 2016-11-21 02:28:10 +01:00
har_dump.py organize examples 2016-11-21 02:28:10 +01:00
mitmproxywrapper.py organize examples 2016-11-21 02:28:10 +01:00
nonblocking.py organize examples 2016-11-21 02:28:10 +01:00
README.md remove stickycookie example 2016-11-21 02:46:25 +01:00
remote_debug.py organize examples 2016-11-21 02:28:10 +01:00
sslstrip.py organize examples 2016-11-21 02:28:10 +01:00
stream_modify.py organize examples 2016-11-21 02:28:10 +01:00
stream.py organize examples 2016-11-21 02:28:10 +01:00
tcp_message.py organize examples 2016-11-21 02:28:10 +01:00
tls_passthrough.py organize examples 2016-11-21 02:28:10 +01:00

Complex Examples

Filename Description
change_upstream_proxy.py Dynamically change the upstream proxy.
dns_spoofing.py Use mitmproxy in a DNS spoofing scenario.
dup_and_replay.py Duplicates each request, changes it, and then replays the modified request.
flowbasic.py Basic use of mitmproxy's FlowMaster directly.
full_transparency_shim.c Setuid wrapper that can be used to run mitmproxy in full transparency mode, as a normal user.
har_dump.py Dump flows as HAR files.
mitmproxywrapper.py Bracket mitmproxy run with proxy enable/disable on OS X
nonblocking.py Demonstrate parallel processing with a blocking script
remote_debug.py This script enables remote debugging of the mitmproxy UI with PyCharm.
sslstrip.py sslstrip-like funtionality implemented with mitmproxy
stream Enable streaming for all responses.
stream_modify.py Modify a streamed response body.
tcp_message.py Modify a raw TCP connection
tls_passthrough.py Use conditional TLS interception based on a user-defined strategy.