No mitmproxy videos yet. You could help us improve this page by suggesting one.
Based on our record, mitmproxy seems to be a lot more popular than Detectify. While we know about 81 links to mitmproxy, we've tracked only 4 mentions of Detectify. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Detectify once made an offer of making free scans which I took them up on. There are plenty of free Content Security Policy (CSP) and other vulnerability checkers around such as Observatory or Pentest. Shields UP!! Will identify which ports you have open. Source: 7 months ago
Detectify | Community Manager, Crowdsource | REMOTE (Offices in Boston, US & Stockholm, Sweden. We help with relocation if wanted) https://detectify.com/ We are a cyber security company in the industry, and more specifically the EASM (External Attack Surface Monitoring) space by automating and scaling the knowledge of hundreds of ethical hackers through our SaaS platform. Currently through our unique to Detectify... - Source: Hacker News / over 2 years ago
A concept-level idea would be this: 1) For your staging/UAT environment pipeline stages, add a "DAST scan" step, eg. With Detectify (which also has an API accommodating this need) 2) I'd assume, independently from the DAST scan, you ran some tests on UAT. Allow the scan to complete during the time it takes to run your UAT tests. After that, you'll get a report (automated or not) from your scanner. 3) When... Source: almost 3 years ago
Subdomain takeover was pioneered by ethical hacker Frans Rosén and popularized by Detectify in a seminal blogpost as early as 2014. However, it remains an underestimated (or outright overlooked) and widespread vulnerability. The rise of cloud solutions certainly hasn't helped curb the spread. - Source: dev.to / about 3 years ago
I used to use mitmproxy (https://mitmproxy.org/) a few years back, but haven't in quite a while. - Source: Hacker News / 3 months ago
Sound like you need https://mitmproxy.org/#mitmweb. - Source: Hacker News / 3 months ago
This statement gives a false sense of security. You can use a transparent proxy, like mitmproxy, to view HTTPS traffic - https://mitmproxy.org/. https://reedmideke.github.io/networking/2021/01/04/mitmproxy-openwrt.html. Source: 6 months ago
You'll need to install mitmproxy and set it up on your computer and iOS. I won't go into too much detail here on how to do this, but there are plenty of guides available. This is a pretty good one: https://nadav.ca/2021/02/26/inspecting-an-iphone-s-https-traffic/. Source: 8 months ago
Perhaps you could have your device use a proxy that can do the HTTPS unwrap for you? https://mitmproxy.org/ maybe? - Source: Hacker News / 9 months ago
Burp Suite - Burp Suite is an integrated platform for performing security testing of web applications.
Proxyman.io - Proxyman is a high-performance macOS app, which enables developers to view HTTP/HTTPS requests from apps and domains.
Intruder - Intruder is a security monitoring platform for internet-facing systems.
Charles Proxy - HTTP proxy / HTTP monitor / Reverse Proxy
Websecurify - Websecurify free and premium security tools automatically scan websites for vulnerabilities like SQL Injection, Cross-site Scripting and others
HTTP Toolkit - Beautiful, cross-platform & open-source tools to debug, test & build with HTTP(S). One-click setup for browsers, servers, Android, CLI tools, scripts and more.