replayproxy
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.

replayproxy
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.
replayproxy Description
replayproxy allows you to 're-live' a HTTP session which has been captured in a .pcap file (e.g. in Wireshark). It parses the HTTP streams, caches them, and starts a HTTP proxy. It then replies to HTTP requests with the matching response from the .pcap, ignoring all other requests. Usage: replayproxy.py [-h] [-H HOST] [-p PORT] [-v[v]] FILENAME Arguments: -h|--help Show usage information -H HOST IP to start the proxy on (DEFAULT: 127.0.0.1) -p PORT Port to listen on (DEFAULT: 3128) -v[v] Verbose output (DEFAULT: log only ERRORs, -v = INFO, -vv = DEBUG) FILENAME Path to the .pcap file to parse (required) Normal usage: - Obtain a .pcap file containing the captured HTTP session (e.g. using tcpdump or Wireshark) - Run replayproxy to start the HTTP proxy (see details above) - Configure your browser to use the proxy settings (IP & port) on which replayproxy is running - Browse to the site that was captured To get you started, test.pcap in this repository contains a capture of a visit to http://www.honeynet.org Dependencies:
replayproxy FAQ
Common questions about replayproxy including features, pricing, alternatives, and user reviews.
replayproxy is replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.. It is a Security Operations solution designed to help security teams with PCAP.