commands.sh

mitmproxy

all

An interactive man-in-the-middle HTTP proxy. See also: `mitmweb`, `mitmdump`.

More info →

Options (5)

-p, --listen-portboolean

Start `mitmproxy` bound to a custom address and port

Example: mitmproxy --listen-host {{ip_address}} {{[-p|--listen-port]}} {{port}}
-s, --scriptsboolean

Start `mitmproxy` using a script to process traffic

Example: mitmproxy {{[-s|--scripts]}} {{path/to/script.py}}
-m, --modeboolean

Specify mode of operation of the proxy server (`regular` is the default)

Example: mitmproxy {{[-m|--mode]}} {{regular|transparent|socks5|...}}
-w, --save-stream-fileboolean

Save all proxied traffic to a file for later analysis

Example: mitmproxy {{[-w|--save-stream-file]}} {{path/to/dump.mitm}}
boolean

Replay a previously saved HTTP flow file

Example: mitmproxy {{[-nr|--no-server --rfile]}} {{path/to/dump.mitm}}

Examples (8)

Start `mitmproxy` with default settings (will listen on port `8080`)

Start `mitmproxy` bound to a custom address and port

mitmproxy --listen-host ip_address [-p|--listen-port] port

Start `mitmproxy` using a script to process traffic

mitmproxy [-s|--scripts] path/to/script.py

Export the logs with SSL/TLS master keys to external programs (wireshark, etc.)

SSLKEYLOGFILE="path/to/file" mitmproxy

Specify mode of operation of the proxy server (`regular` is the default)

mitmproxy [-m|--mode] regular|transparent|socks5|...

Set the console layout

mitmproxy --console-layout horizontal|single|vertical

Save all proxied traffic to a file for later analysis

mitmproxy [-w|--save-stream-file] path/to/dump.mitm

Replay a previously saved HTTP flow file

mitmproxy [-nr|--no-server --rfile] path/to/dump.mitm
made by @shridhargupta | data from tldr-pages