DEPRECATION NOTICE: This software is no longer maintained. The goal of this project is to allow for accurate detection of HTTPS interception and robust TLS fingerprinting. This project is based off of The Security Impact of HTTPS Interception, and started as a port to Go of their processing scripts and fingerprints. More context about MITMEngine is available in this Cloudflare blog post. Quick Links: - Signatures and Fingerprints: Core Definitions - MITM Detection Methodology - API Example Usage - Building and Testing - How to Contribute - mergeDB utility Requirements - Go - Wireshark 3.0.0 (wireshark -v to check) Documentation: Detailed documentation lives with the code (copy package to $(GOPATH)/src/github.com/cloudflare/mitmengine first). Command to access documentation: godoc -http=:6060 http://localhost:6060/pkg/github.com/cloudflare/mitmengine Signature and Fingerprints: In this project, fingerprints map to concrete instantiations of an object, while signatures can represent multiple objects. We use this convention because a fingerprint is usually an inherent property of an object, while a signature can be chosen. In the same way, an actual client request seen by a server would have a fingerprint, while the software
FEATURES
SIMILAR TOOLS
A high-level C++ library for creating and decoding network packets with a Scapy-like interface.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
pfSense is a leading open source firewall and network security solution, providing advanced protection and connectivity options.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.
A network protocol panic button operating decentralized through UDP broadcasts and HTTP, intended for sensitive networks to prevent cold boot attacks.
An extended traceroute tool for CSIRT operators with advanced features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.