LinuxCommandLibrary

proxify

HTTP/HTTPS proxy for traffic capture

TLDR

Start proxy server

$ proxify
copy
Specify port
$ proxify -p [8888]
copy
Output to directory
$ proxify -o [logs/]
copy
Upstream proxy
$ proxify -upstream [http://127.0.0.1:8080]
copy
Dump requests
$ proxify -dump-req
copy
Dump responses
$ proxify -dump-resp
copy
Filter by content type
$ proxify -match-resp-body "[text/html]"
copy

SYNOPSIS

proxify [-p port] [-o dir] [-upstream proxy] [options]

DESCRIPTION

proxify is a lightweight HTTP/HTTPS proxy designed for capturing and logging web traffic during security testing. It intercepts requests and responses, dumping headers and bodies to the console or organized output directories for later analysis.
Pattern matching options filter captured traffic by request or response body content, allowing testers to focus on specific content types or keywords of interest. Upstream proxy support enables chaining through tools like Burp Suite or mitmproxy for more advanced inspection.
The tool is developed by ProjectDiscovery and integrates with their security testing toolkit. Traffic is saved organized by domain, making it straightforward to review captured data from specific targets.

PARAMETERS

-p, --port PORT

Listen port.
-o, --output DIR
Output directory.
-upstream PROXY
Upstream proxy.
-dump-req
Dump requests.
-dump-resp
Dump responses.
-match-resp-body PATTERN
Filter response body.
-match-req-body PATTERN
Filter request body.
-silent
Silent mode.
-v, --verbose
Verbose output.

CAVEATS

HTTPS requires certificate installation. Large traffic volumes consume disk. Some apps detect proxies.

HISTORY

Proxify was created by ProjectDiscovery for security testing. It provides simple traffic interception for web application analysis.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community