Intercept and analyze HTTP/HTTPS traffic with mitmproxy. Debug API calls, inspect headers, modify requests, and replay traffic.
Powered by mitmproxyCapture all HTTP and HTTPS traffic between your client and server. See headers, bodies, and timing.
Edit requests and responses on the fly. Change headers, modify payloads, or redirect traffic.
Replay captured requests with modifications. Perfect for debugging edge cases and testing APIs.
Filter traffic by host, path, method, or content type. Focus on what matters.
Export captured traffic as HAR files or share session recordings with teammates.
Modern web UI accessible through your ASD tunnel. No local installation required for viewers.
Start with Docker. Web UI on port 8081.
network:
services:
mitmproxy:
dial: "127.0.0.1:8081"One command. Tunnel created.
Share with your team. Debug together.
Inspect API requests and responses to understand data flow
Capture and analyze incoming webhook payloads
Proxy mobile device traffic through mitmproxy
Analyze request/response patterns for vulnerabilities
mitmproxy is an open-source project. Learn more from the official documentation.
View mitmproxy DocsYes, mitmproxy can decrypt HTTPS traffic by acting as a man-in-the-middle proxy. Install the mitmproxy CA certificate on your client device to enable HTTPS inspection.
Configure your mobile device to use your computer as a proxy (the IP and port where mitmproxy runs). Then install the mitmproxy CA certificate from mitm.it on your device.
Yes, mitmproxy supports request and response modification. You can edit headers, change payloads, add delays, or redirect traffic using mitmproxy scripts or the interactive interface.
Yes, mitmproxy is open-source and free. ASD provides secure tunnel access to the mitmproxy web interface so you can share debugging sessions with your team.
Start free and expose mitmproxy via secure tunnel.