replayproxy allows you to 're-live' a HTTP session which has been captured in a .pcap file (e.g. in Wireshark). It parses the HTTP streams, caches them, and starts a HTTP proxy. It then replies to HTTP requests with the matching response from the .pcap, ignoring all other requests. Usage: replayproxy.py [-h] [-H HOST] [-p PORT] [-v[v]] FILENAME Arguments: -h|--help Show usage information -H HOST IP to start the proxy on (DEFAULT: 127.0.0.1) -p PORT Port to listen on (DEFAULT: 3128) -v[v] Verbose output (DEFAULT: log only ERRORs, -v = INFO, -vv = DEBUG) FILENAME Path to the .pcap file to parse (required) Normal usage: - Obtain a .pcap file containing the captured HTTP session (e.g. using tcpdump or Wireshark) - Run replayproxy to start the HTTP proxy (see details above) - Configure your browser to use the proxy settings (IP & port) on which replayproxy is running - Browse to the site that was captured To get you started, test.pcap in this repository contains a capture of a visit to http://www.honeynet.org Dependencies:
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A simple honeypot that opens a listening socket and waits for connection attempts, with configurable reply and event handling
A tool for classifying packets into flows based on 4-tuple without additional processing.
High-performance remote packet capture and collection tool used for forensic analysis in cloud workloads.
Accurate detection of HTTPS interception and robust TLS fingerprinting tool.
A Burp Suite extension that formats GraphQL requests for easier reading
Open source security-oriented language for describing protocols and applying security policies on captured traffic.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.