mitmproxy - an SSL-capable man-in-the-middle proxy

mitmproxy is an SSL-capable man-in-the-middle proxy for HTTP. It provides a console interface that allows traffic flows to be inspected and edited on the fly.

mitmdump is the command-line version of mitmproxy, with the same functionality but without the user interface. Think tcpdump for HTTP.

  • Features 
  • Intercept HTTP requests and responses and modify them on the fly. 
  • Save complete HTTP conversations for later replay and analysis. 
  • Replay the client-side of an HTTP conversations. 
  • Replay HTTP responses of a previously recorded server. 
  • Reverse proxy mode to forward traffic to a specified server. 
  • Make scripted changes to HTTP traffic using Python. 
  • SSL certificates for interception are generated on the fly.
Install

The easiest way to install the latest release of mitmproxy is to use pip: pip install mitmproxy

For further instructions, see the Installation section of the documentation.

Download
Requirements
  • The following auxiliary components may be needed if you plan to hack on mitmproxy: 
  • The test suite uses the pry unit testing library. 
  • Rendering the documentation requires countershape
  • mitmproxy is tested and developed on OSX, Linux and OpenBSD. Windows is not supported at the moment. 
  • You should also make sure that your console environment is set up with the following: 
  • EDITOR environment variable to determine the external editor. 
  • PAGER environment variable to determine the external pager. 
  • Appropriate entries in your mailcap files to determine external viewers for request and response contents. 
Source -
http://mitmproxy.org/index.html
Screenshot -