CybersecTools API access is now live!Learn More
Modlishka Logo

Modlishka

Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.

5,084
Visit website
Compare
Compare
0
APIBuild market maps, track competitors, monitor vendorsRequest API Access

Modlishka Description

Modlishka is a powerful, open-source reverse proxy tool that allows users to intercept and manipulate HTTP traffic, making it an ideal solution for penetration testers, security researchers, and developers to analyze and test web applications. With Modlishka, users can easily set up a reverse proxy server to intercept and modify HTTP requests and responses, enabling them to identify vulnerabilities, test web application security, and develop custom security tools. The tool provides a flexible and customizable framework for building custom proxy servers, making it an essential tool for anyone involved in web application security testing and development.

Modlishka FAQ

Common questions about Modlishka including features, pricing, alternatives, and user reviews.

Modlishka is Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.. It is a Security Operations solution designed to help security teams with Red Team, Open Source.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

CAI (Cybersecurity AI) Logo

An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.

0
FourCore ATTACK Logo

FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence

0
OFFODE Logo

A proof-of-concept Node.js tool that demonstrates automated MFA bypass techniques for Microsoft Outlook accounts using browser automation.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
PwnAuth Logo

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox