- About us
- Code of Conduct
- Google SoC
- Recent posts
- Security Workshops
With Google Summer of Code (GSoC) 2017 being around the corner, we’d like to do a short flashback to 2016, our most successful GSoC year for mitmproxy so far! GSoC 2016 was mitmproxy’s fourth time participating in the program under the umbrella of the Honeynet Project. For the first time, we were able to mentor three students over the summer to work on both our Python core and the brand new web interface. As a major milestone, mitmproxy is now a Python 3 project and has a fantastic user interface that even works on Windows. With these improvements in, we finally decided to pull the trigger and called it the mitmproxy 1.0 release!
Mitmproxy is an interactive TLS-capable man-in-the-middle proxy. It can be used to intercept, inspect, modify and replay HTTP, HTTP/2, HTTPS, WebSockets, and raw TCP traffic. The open source tool can be used with any device or program to see how it communicates on the network. Mitmproxy is used by software developers, penetration testers, privacy advocates and researchers to fix bugs, find vulnerabilities, uncover privacy violations, conduct empirical research, and more.
We asked Clemens Brunner about his GSoC student experience with mitmproxy and Honeynet:
We had a great time mentoring our students on their projects last year, thank you all! We would also like to thank Google for the fantastic opportunity that they have provided as well as the Honeynet Project for hosting us under their umbrella.
For 2017, we have prepared two project ideas for mitmproxy and we’re keeping our fingers crossed that Honeynet will once again be part of the lucky selected mentoring organizations announced on February 27th!