httpbin
mitmproxy
httpbin | mitmproxy | |
---|---|---|
72 | 152 | |
12,430 | 34,568 | |
0.7% | 1.5% | |
0.0 | 9.4 | |
2 months ago | 9 days ago | |
Python | Python | |
ISC License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
httpbin
-
How to protect API Keys in React projects using Gateweaver
policyDefinitions: cors: origin: "${CLIENT_URL}" endpoints: - path: "/example" target: url: "https://httpbin.org/bearer" request: headers: Authorization: "Bearer ${API_KEY}" policies: - cors
- Bruno
-
Hardening Apache APISIX with the OWASP's Coraza and Core Ruleset
We proceed to define routes to https://httpbin.org/ to test our setup. Let's call the route to /get:
-
looking for resource site for GET-POST practice (html)
https://httpbin.org/ is an excellent tool for learning (and testing) the basics. Take a few minutes to explore the endpoints they provide. You can also use different response codes to test your apps error handling, etc
-
httpbin alternatives - go-httpbin and java-httpbin
3 projects | 12 Nov 2023
-
Crafting a Language Server in Golang: A VSCode LSP for Lama2
export FABI_PROD="http://httpbin.org/" export FABI_LOCAL="http://0.0.0.0:8000/"
-
Edge IoT with Rust on ESP: HTTP Client
use anyhow; use embedded_svc::http::client::Client; use embedded_svc::wifi::{AuthMethod, ClientConfiguration, Configuration}; use esp_idf_hal::peripherals::Peripherals; use esp_idf_svc::eventloop::EspSystemEventLoop; use esp_idf_svc::http::client::{Configuration as HttpConfig, EspHttpConnection}; use esp_idf_svc::nvs::EspDefaultNvsPartition; use esp_idf_svc::wifi::{BlockingWifi, EspWifi}; fn main() -> anyhow::Result<()> { esp_idf_sys::link_patches(); // Configure Wifi let peripherals = Peripherals::take().unwrap(); let sysloop = EspSystemEventLoop::take()?; let nvs = EspDefaultNvsPartition::take()?; let mut wifi = BlockingWifi::wrap( EspWifi::new(peripherals.modem, sysloop.clone(), Some(nvs))?, sysloop, )?; wifi.set_configuration(&Configuration::Client(ClientConfiguration { ssid: "SSID".into(), bssid: None, auth_method: AuthMethod::None, password: "PASSWORD".into(), channel: None, }))?; // Start Wifi wifi.start()?; // Connect Wifi wifi.connect()?; // Wait until the network interface is up wifi.wait_netif_up()?; // Print Out Wifi Connection Configuration while !wifi.is_connected().unwrap() { // Get and print connection configuration let config = wifi.get_configuration().unwrap(); println!("Waiting for station {:?}", config); } println!("Wifi Connected, Intiatlizing HTTP"); // HTTP Configuration // Create HTTPS Connection Handle let httpconnection = EspHttpConnection::new(&HttpConfig { use_global_ca_store: true, crt_bundle_attach: Some(esp_idf_sys::esp_crt_bundle_attach), ..Default::default() })?; // Create HTTPS Client let mut httpclient = Client::wrap(httpconnection); // HTTP Request Submission // Define URL let url = "https://httpbin.org/get"; // Prepare request let request = httpclient.get(url)?; // Log URL and type of request println!("-> GET {}", url); // Submit Request and Store Response let response = request.submit()?; // HTTP Response Processing let status = response.status(); println!("<- {}", status); match response.header("Content-Length") { Some(data) => { println!("Content-Length: {}", data); } None => { println!("No Content-Length Header"); } } match response.header("Date") { Some(data) => { println!("Date: {}", data); } None => { println!("No Date Header"); } } Ok(()) }
-
Down the rabbit hole of an Apache APISIX plugin
has_domain: whether the matched route references an upstream with a domain, e.g., http://httpbin.org, or not, e.g., 192.168.0.1
- Show HN: HTTP Status Code Generator
- Python Software Foundation forks httpbin
mitmproxy
- Ask HN: Fiddler Alternatives
- Bruno
-
AirBnb Wifi Safety Precaution needed?
This statement gives a false sense of security. You can use a transparent proxy, like mitmproxy, to view HTTPS traffic - https://mitmproxy.org/. https://reedmideke.github.io/networking/2021/01/04/mitmproxy-openwrt.html
-
WORKING tutorial on how to enable iOS voice chat RIGHT NOW
You'll need to install mitmproxy and set it up on your computer and iOS. I won't go into too much detail here on how to do this, but there are plenty of guides available. This is a pretty good one: https://nadav.ca/2021/02/26/inspecting-an-iphone-s-https-traffic/
-
mitmproxy VS petep - a user suggested alternative
2 projects | 3 Oct 2023
-
Upside-Down-Ternet (2006)
TIL this goes back to 2006, how cool! We nowadays have a much simpler version as a mitmproxy example: https://github.com/mitmproxy/mitmproxy/blob/main/examples/ad.... Although it obviously does not work as well anymore with everything being HTTPS nowadays (unless you trust the cert of course). :)
-
Ask Dang: What Has Happened with HN's HTTPS Recently?
Perhaps you could have your device use a proxy that can do the HTTPS unwrap for you? https://mitmproxy.org/ maybe?
-
How to implement SSL/TLS pinning in Node.js
A great way to test the effectiveness of a pinning implementation is by simulating an MITM attack. Tools like Mitmproxy or Wireshack allow us to create a test environment to monitor, intercept, and proxy network requests for a test host.
- Evading JavaScript Anti-Debugging Techniques
- Compatibility with Newer Versions of Cryptography
What are some alternatives?
echo-server - An HTTP and WebSocket "echo" server for testing proxies and HTTP clients.
Wireshark - Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. ⚠️ GitHub won't let us disable pull requests. ⚠️ THEY WILL BE IGNORED HERE ⚠️ Upload them at GitLab instead.
gabbi - Declarative HTTP Testing for Python and anything else
Shadowrocket-ADBlock-Rules - 提供多款 Shadowrocket 规则,带广告过滤功能。用于 iOS 未越狱设备选择性地自动翻墙。
novelai-api - Python API for the NovelAI REST API
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
azure-docs - Open source documentation of Microsoft Azure
sslstrip - A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
echo-server - An HTTP and WebSocket "echo" server for testing proxies and HTTP clients.
IOXY - MQTT intercepting proxy
gunicorn - gunicorn 'Green Unicorn' is a WSGI HTTP Server for UNIX, fast clients and sleepy applications.
ZAP - The ZAP core project