MITMEngine Logo

MITMEngine

0
Free
Visit Website

DEPRECATION NOTICE: This software is no longer maintained. The goal of this project is to allow for accurate detection of HTTPS interception and robust TLS fingerprinting. This project is based off of The Security Impact of HTTPS Interception, and started as a port to Go of their processing scripts and fingerprints. More context about MITMEngine is available in this Cloudflare blog post. Quick Links: - Signatures and Fingerprints: Core Definitions - MITM Detection Methodology - API Example Usage - Building and Testing - How to Contribute - mergeDB utility Requirements - Go - Wireshark 3.0.0 (wireshark -v to check) Documentation: Detailed documentation lives with the code (copy package to $(GOPATH)/src/github.com/cloudflare/mitmengine first). Command to access documentation: godoc -http=:6060 http://localhost:6060/pkg/github.com/cloudflare/mitmengine Signature and Fingerprints: In this project, fingerprints map to concrete instantiations of an object, while signatures can represent multiple objects. We use this convention because a fingerprint is usually an inherent property of an object, while a signature can be chosen. In the same way, an actual client request seen by a server would have a fingerprint, while the software

FEATURES

ALTERNATIVES

Passive SSL client fingerprinting tool using handshake analysis.

A Burp extension to detect alias traversal via NGINX misconfiguration at scale.

A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.

A lookup service for AS-numbers and prefixes by country

A simple Docker-based honeypot to detect port scanning

A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.

A multi-tool for subdomain enumeration

replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved