httptools helps you to capture, repeat and live intercept HTTP requests with scripting capabilities and is built on top of mitmproxy.
pip install http-tools
$ git clone https://github.com/MobSF/httptools.git
$ cd httptools
$ python setup.py develop
$ httptools
usage: httptools [-h] [-m MODE] [-p PORT] [-i IP] [-n NAME] [-u UPSTREAM]
optional arguments:
-h, --help show this help message and exit
-m MODE, --mode MODE Supported modes
1. capture: Capture requests.
2. repeat: Repeat captured requests.
3. intercept: Intercept and tamper the request.
4. server: Start httptools server.
-p PORT, --port PORT Proxy Port
-i IP, --ip IP Proxy Host
-n NAME, --name NAME Project Name
-u UPSTREAM, --upstream UPSTREAM
Upstream Proxy
- Capture -
httptools -m capture
- Starts HTTPS proxy at
0.0.0.0:1337
by default. - Install Root CA cert from
http://mitm.it/
- Starts HTTPS proxy at
- Repeat -
httptools -m repeat
- Replay the captured traffic. Use --upstream to forward it to a fuzzer like BurpSuite or OWASP ZAP.
- Intercept -
httptools -m intercept
- To Fiddle with HTTP request and response in live.
- Use:
http_tools/modules/interceptor.py
(The location will be relative to where httptools is installed)
- Server Web UI -
httptools -m server
- Starts the Web UI at
https://0.0.0.0:1337
by default.
- Starts the Web UI at