proxify
HTTP/HTTPS proxy for traffic capture
TLDR
Start proxy server
SYNOPSIS
proxify [-p port] [-o dir] [-upstream proxy] [options]
DESCRIPTION
proxify is a lightweight HTTP/HTTPS proxy designed for capturing and logging web traffic during security testing. It intercepts requests and responses, dumping headers and bodies to the console or organized output directories for later analysis.
Pattern matching options filter captured traffic by request or response body content, allowing testers to focus on specific content types or keywords of interest. Upstream proxy support enables chaining through tools like Burp Suite or mitmproxy for more advanced inspection.
The tool is developed by ProjectDiscovery and integrates with their security testing toolkit. Traffic is saved organized by domain, making it straightforward to review captured data from specific targets.
PARAMETERS
-p, --port PORT
Listen port.-o, --output DIR
Output directory.-upstream PROXY
Upstream proxy.-dump-req
Dump requests.-dump-resp
Dump responses.-match-resp-body PATTERN
Filter response body.-match-req-body PATTERN
Filter request body.-silent
Silent mode.-v, --verbose
Verbose output.
CAVEATS
HTTPS requires certificate installation. Large traffic volumes consume disk. Some apps detect proxies.
HISTORY
Proxify was created by ProjectDiscovery for security testing. It provides simple traffic interception for web application analysis.
