About this site

This site presents a list of open source HTTP proxies written in java and python, with comparison tables, so that you compare the proxies on a feature by feature basis. Further detail is available on each proxy: click it's name for more info.

About xhaus.com

  1. Follow xhaus.com on twitter
  2. Read the xhaus.com blog
  3. Browse the xhaus.com opensource portal

What is a HTTP proxy?

A HTTP proxy acts as an intermediary between a HTTP client (i.e. browser) and HTTP server. It receives all requests from the browser, and relays them (possibly modified) to the server. Likewise, it receives all responses from the server, and relays them (possibly modified) to the client. HTTP Proxies can be used for a wide variety of tasks, including filtering, logging, caching, etc, etc, etc.

Contact us

If any of the details on this page are incorrect or out-of-date, or you find a proxy that is not listed here, please feel free to tell us about it.

NAVIGATION: Front page | java proxy comparison table | python proxy comparison table

Detailed information about JAVA proxy: mitm-proxy
Proxy Name mitm-proxy
Language and version java version: 1.5
HTTP version
HTTPS Connect no
Windows NTLM support
Last updated YYYY-MM-DD 2007-04-12
Platform all
Author Prof. Dan Boneh
Home page http://crypto.stanford.edu/ssl-mitm/
Primary features Man-In-The-Middle (MITM) Proxy
Features

From the product page:

mitm-proxy is an Java-based SSL proxy that acts as a "man in the middle". In other words, proxied HTTPS requests are terminated by the proxy and resent to the remote webserver. The server certificates presented to the client (i.e. a web browser) are dynamically generated/signed by the proxy and contain most of the same fields as the original webserver certificate. The subject DN, serial number, validity dates, and extensions are preserved. However, the issuer DN is now set to the name of the proxy's self-signed certificate and the public/private keys of the proxy are used in creating the forged certificate. These forged certificates are cached (in memory) by the proxy, for better performance.

License Bespoke
Design Architecture Threaded
Notes

NOTE : this tool can NOT be used for any commercial purposes, as is, because it makes use of an educational/research version of the IAIK JCE library.