Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
JavaScript Python CSS
tag: v0.1

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
.settings
build
docs
gui
libhproxy
mitmproxy @ 1d9bdf7
test
.gitignore
.gitmodules
.project
.pydevproject
LICENSE
README.md
honeyproxy.py

README.md

HoneyProxy

HoneyProxy is a lightweight man-in-the-middle proxy that helps you analyze HTTP(S) traffic flows. It is tailored to the needs of security researchers and allows both real-time and log analysis. Being compatible with mitmproxy, it focuses on features that are useful in a forensic context and allows extended visualization capabilites.

HoneyProxy is developed as a HTML5 HTML5 browser-based application working on top of a logging core written in Python. It is primarily developed by Maximilian Hils and mentored by Guillaume Arcas as part of the Honeynet Google Summer of Code 2012 project.

More details can be found on the Honeynet project page.

Current Status

HoneyProxy is currently in an early beta phase. While there are still many features missing, HoneyProxy is already a nice open source alternative to other proxies such as BURP. Below you can see a screenshot of the current status - a real-time log sorted by request time.

screenshot

We love to hear from your experience with HoneyProxy. If you have any feature suggestions, please get in touch :)

Quick start

Download the latest release or clone the git repo: git clone --recursive git://github.com/mhils/HoneyProxy.git.

Install all dependencies: pip install pyOpenSSL pyasn1 Twisted Autobahn netlib

To start HoneyProxy, just run python honeyproxy.py or python honeyproxy.py --help

Most command line parameters are documented in the mitmproxy docs.

Dependencies

Contributing

Anyone and everyone is welcome to contribute. Come join us in the #gsoc2012-honeynet channel on the Freenode IRC network (irc://irc.freenode.net:6667).

Something went wrong with that request. Please try again.