mitmweb
Man-in-the-middle proxy with a web interface
TLDR
SYNOPSIS
mitmweb [options]
DESCRIPTION
mitmweb is the web-based interface for mitmproxy. It intercepts, inspects, modifies, and replays HTTP/HTTPS traffic through a browser-based UI. The web interface provides flow listing, detail views, and interactive request/response editing.
By default, mitmweb starts a proxy on port 8080 and a web interface on port 8081. It supports the same proxy modes as mitmproxy: regular, transparent, SOCKS5, reverse proxy, upstream proxy, and WireGuard.
Clients must be configured to use the proxy, and for HTTPS interception, the mitmproxy CA certificate must be installed on the client. Visit http://mitm.it through the proxy to download certificates.
PARAMETERS
--web-port PORT
Port for the web interface (default: 8081).--web-open-browser
Automatically open a browser on startup (default: true).--no-web-open-browser
Do not automatically open a browser.--listen-port PORT
Proxy listen port (default: 8080).-w FILE
Write flows to file.-r FILE
Read flows from file.--mode MODE
Proxy mode: regular, transparent, socks5, reverse:SPEC, upstream:SPEC, wireguard.--set OPTION=VALUE
Set an arbitrary option (e.g., --set ignore_hosts=example.com).-s SCRIPT
Run a Python addon script.--ssl-insecure
Do not verify upstream server SSL/TLS certificates.--help
Display help information.
CAVEATS
HTTPS interception requires installing the mitmproxy CA certificate on the client device. Transparent mode requires OS-level traffic redirection (e.g., iptables). The web interface should not be exposed to untrusted networks without authentication.
HISTORY
mitmweb is part of the mitmproxy project, created by Aldo Cortesi. The mitmproxy project started in 2010 and mitmweb was added to provide a browser-based alternative to the console-based mitmproxy interface.
