Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 686

mitmproxy

What is mitmproxy?

mitmproxyAn open-source interactive TLS-capable proxy used by security and QA engineers to intercept, inspect, modify, and replay HTTP and HTTPS traffic.


mitmproxy is a Python-based tool that ships as a terminal UI (mitmproxy), a web UI (mitmweb), and a scriptable command-line proxy (mitmdump). It transparently terminates TLS using a generated CA that must be trusted by the client, lets the user pause, edit, and replay requests, and supports add-ons written in Python to automate analysis. Security testers use mitmproxy to audit mobile apps, fuzz REST and GraphQL APIs, capture undocumented protocols, and validate certificate pinning. Note that mitmproxy is a legitimate defensive and testing tool, not an attack tool: it requires control of the device or network and a trusted CA, so it is unsuitable for adversary-in-the-middle attacks against untrusting clients.

Examples

  1. 01

    Intercepting an iOS app's API calls by routing the device through a mitmproxy instance and trusting its CA on the phone.

  2. 02

    Writing a Python add-on that automatically modifies authentication headers to fuzz an API for IDOR vulnerabilities.

Frequently asked questions

What is mitmproxy?

An open-source interactive TLS-capable proxy used by security and QA engineers to intercept, inspect, modify, and replay HTTP and HTTPS traffic. It belongs to the Defense & Operations category of cybersecurity.

What does mitmproxy mean?

An open-source interactive TLS-capable proxy used by security and QA engineers to intercept, inspect, modify, and replay HTTP and HTTPS traffic.

How does mitmproxy work?

mitmproxy is a Python-based tool that ships as a terminal UI (mitmproxy), a web UI (mitmweb), and a scriptable command-line proxy (mitmdump). It transparently terminates TLS using a generated CA that must be trusted by the client, lets the user pause, edit, and replay requests, and supports add-ons written in Python to automate analysis. Security testers use mitmproxy to audit mobile apps, fuzz REST and GraphQL APIs, capture undocumented protocols, and validate certificate pinning. Note that mitmproxy is a legitimate defensive and testing tool, not an attack tool: it requires control of the device or network and a trusted CA, so it is unsuitable for adversary-in-the-middle attacks against untrusting clients.

How do you defend against mitmproxy?

Defences for mitmproxy typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for mitmproxy?

Common alternative names include: mitmweb, mitmdump.

Related terms

See also