Public Repository

Last pushed: 13 hours ago
Short Description
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Full Description


Containerized version of mitmproxy, an interactive SSL-capable intercepting HTTP proxy.


$ docker run --rm -it [-v ~/.mitmproxy:/home/mitmproxy/.mitmproxy] -p 8080:8080 mitmproxy/mitmproxy

The volume mount is optional: It's to store the generated CA certificates.

Once started, mitmproxy listens as a HTTP proxy on localhost:8080:

$ http_proxy=http://localhost:8080/ curl
$ https_proxy=http://localhost:8080/ curl -k

You can also start mitmdump by just adding that to the end of the command-line:

$ docker run --rm -it -p 8080:8080 mitmproxy/mitmproxy mitmdump

For mitmweb, you also need to expose port 8081:

# this makes :8081 accessible to the local machine only
$ docker run --rm -it -p 8080:8080 -p mitmproxy/mitmproxy mitmweb --web-iface

You can also pass options directly via the CLI:

$ docker run --rm -it -p 8080:8080 mitmproxy/mitmproxy mitmdump --set ssl_insecure=true

For further details, please consult the mitmproxy documentation.


The available release tags can be seen here.
"master" always tracks the git-master branch and represents the unstable development tree.
"latest" always tracks the most-recent major release, including bugfixes.

Docker Pull Command