httpry Logo

httpry

0
Free
Visit Website

httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the traffic as it is parsed, or as a daemon process that logs to an output file. It is written to be as lightweight and flexible as possible, so that it can be easily adaptable to different applications. What can you do with it? - See what users on your network are requesting online - Check for proper server configuration (or improper, as the case may be) - Research patterns in HTTP usage - Watch for dangerous downloaded files - Verify the enforcement of HTTP policy on your network - Extract HTTP statistics out of saved capture files - It's just plain fun to watch in realtime Here's an example of the log file output using the default output format string: # httpry version 0.1.8 # Fields: timestamp,source-ip,dest-ip,direction,method,host,request-uri,http-version,status-code,reason-phrase 2009-01-12 15:02:31 192.168.0.16 209.85.171.103 > GET www.google.com / HTTP/1.1 - - 2009-01-12 15:02:31 192.168.0.16 209.85.171.103 > GET www.google.com / HTTP/1.1 - - 2009-01-12 15:02:32 192.168.0.16 209.85.171.103 > GET www.google.com / HTTP/1.1 - - 2009-01-12 15:02:33 192.168.0.16 209.85.171.103 > GET www.google.com / HTTP/1.1 - - 2009-01-12 15:02:33 209.85.171.103 192.168.0.16

FEATURES

ALTERNATIVES

JARM is a TLS server fingerprinting tool used for identifying server configurations and malicious infrastructure.

A simple tool to take screenshots of HTTPS websites

An automated DDoS vulnerability testing platform that continuously evaluates DDoS protection systems without causing operational downtime.

A fast domain resolver and subdomain bruteforcing tool

A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.

A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.

Django based web application for network traffic analysis with protocol handling capabilities.

A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security