{"id":23820106,"url":"https://github.com/claudiaslibrary/mitm-proxy","last_synced_at":"2025-04-13T15:58:29.513Z","repository":{"id":266649718,"uuid":"898940988","full_name":"ClaudiasLibrary/mitm-proxy","owner":"ClaudiasLibrary","description":"This project is a Man-in-the-Middle (MITM) Proxy tool built using mitmproxy. It allows for real-time HTTP/HTTPS traffic interception, modification, and analysis.","archived":false,"fork":false,"pushed_at":"2025-02-17T19:04:16.000Z","size":12,"stargazers_count":3,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-27T06:51:19.586Z","etag":null,"topics":["ethical-hacking","man-in-the-middle","mitm","mitmproxy","penetration-testing","traffic-analysis"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ClaudiasLibrary.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-12-05T10:24:25.000Z","updated_at":"2025-02-17T19:04:19.000Z","dependencies_parsed_at":"2024-12-10T18:15:22.470Z","dependency_job_id":null,"html_url":"https://github.com/ClaudiasLibrary/mitm-proxy","commit_stats":null,"previous_names":["claudiaslibrary/mitm-proxy"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ClaudiasLibrary%2Fmitm-proxy","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ClaudiasLibrary%2Fmitm-proxy/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ClaudiasLibrary%2Fmitm-proxy/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ClaudiasLibrary%2Fmitm-proxy/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ClaudiasLibrary","download_url":"https://codeload.github.com/ClaudiasLibrary/mitm-proxy/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248741195,"owners_count":21154252,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ethical-hacking","man-in-the-middle","mitm","mitmproxy","penetration-testing","traffic-analysis"],"created_at":"2025-01-02T07:19:45.587Z","updated_at":"2025-04-13T15:58:29.487Z","avatar_url":"https://github.com/ClaudiasLibrary.png","language":"Python","readme":"# Man-In-The-Middle Proxy\n\nThis project is a Man-in-the-Middle (MITM) Proxy tool built using `mitmproxy`.\nIt allows for real-time HTTP/HTTPS traffic interception, modification, and analysis.\nIt includes advanced features such as SSL Pinning Bypass, WebSocket Modification, Dynamic SSL Certificates, and real-time traffic analysis with Elasticsearch integration.\n\n## Theory behind the code\n[Exploiting Wired Networks](https://claudiaslibrary.notion.site/Exploiting-Wired-Networks-13219f75683280ef8cdecaa2feca683e)\n\n## Features\n\n- **SSL Pinning Bypass**: Bypass SSL Pinning in mobile applications using Frida.\n- **Dynamic SSL Certificate Handling**: Inject dynamic SSL certificates for each intercepted domain.\n- **WebSocket Traffic Interception**: Intercept and modify WebSocket messages in real-time.\n- **Real-Time Traffic Analysis**: Log and send intercepted traffic to Elasticsearch for real-time analysis.\n- **Reporting \u0026 Visualization**: Generate dynamic HTML reports of the intercepted traffic using Jinja2 templates.\n\n## Requirements\n\n1. Python 3.x\n2. mitmproxy\n3. frida-tools (for SSL Pinning Bypass)\n4. Elasticsearch (optional for real-time analysis)\n5. Jinja2 (for HTML report generation)\n\n### Install dependencies:\n\npip install -r requirements.txt\n\n## Example:\nHere is an example of how the mitmproxy runs after the user inputs the configuration:\n\n```bash\nEnter the listen host (default 0.0.0.0): 0.0.0.0\nEnter the listen port (default 8080): 8080\nEnter the proxy mode (default regular, options: regular, transparent, reverse): regular\nShow host information in logs? (y/n, default: y): y\n```\nThis starts the proxy on 0.0.0.0:8080 in regular mode, and the proxy will log detailed information about the traffic being intercepted.\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fclaudiaslibrary%2Fmitm-proxy","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fclaudiaslibrary%2Fmitm-proxy","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fclaudiaslibrary%2Fmitm-proxy/lists"}