A Python-based SSL proxy server that can intercept and analyze HTTP/HTTPS traffic. This tool is useful for debugging, security testing, and analyzing web traffic.
- HTTP/HTTPS traffic interception
- SSL certificate generation for HTTPS interception
- XSS (Cross-Site Scripting) detection
- Secret detection (API keys, passwords, tokens, etc.)
- Input field analysis
- Request/Response header logging
- Content encoding/decoding support (gzip, deflate)
- Plugin system for extensibility
- Python 3.x
- OpenSSL (for certificate generation)
- Required Python packages (install using
pip
):pip install -r requirements.txt
-
Clone the repository:
git clone https://github.com/sitraj/Proxy.git cd Proxy
-
Install dependencies:
pip install -r requirements.txt
-
Generate SSL certificates:
- Generate a CA key:
openssl genrsa -out ca.key 2048
- Generate a CA certificate:
openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
- Generate a certificate key for the proxy:
openssl genrsa -out cert.key 2048
- Generate a CA key:
-
Create necessary directories:
mkdir certs mkdir results
-
Start the proxy server:
python3 sslproxy.py
The proxy server will start on
localhost:8081
-
Configure your browser/system to use the proxy:
- Proxy Address:
localhost
or127.0.0.1
- Port:
8081
- Proxy Address:
-
For HTTPS interception:
- Import
ca.crt
into your browser/system's trusted root certificates - Different systems/browsers have different methods for importing certificates
- Import
sslproxy.py
: Main proxy server scriptclasses/
proxyrequesthandler.py
: Core proxy request handling logichttpserverclass.py
: HTTP server implementationstringhandler.py
: Content encoding/decoding utilities
plugins/
xssfind/
: XSS detection pluginReqHandle/
: Request handling pluginsecretdetect/
: Secret detection plugin
certs/
: Directory for generated SSL certificatesresults/
: Directory for analysis results
The proxy server supports plugins for extending functionality. Plugins should be placed in the plugins/
directory and follow the plugin interface defined in the project.
Scans for potential Cross-Site Scripting vulnerabilities in web applications.
Identifies sensitive information such as API keys, passwords, tokens, and personal data in HTTP/HTTPS traffic.
Allows modification of requests before they are sent to the target server.
- This tool is for educational and debugging purposes only
- Be cautious when using it on production systems
- Always handle SSL certificates securely
- Be aware of local security and privacy regulations when intercepting traffic
- Be careful with detected secrets - ensure they are handled securely
- Fork the repository
- Create your feature branch
- Commit your changes
- Push to the branch
- Create a new Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.