Skip to content

A programmable MITM proxy that intercepts HTTP/HTTPS traffic so you don't have to guess what your app is doing. Forward & reverse modes, TLS interception, TUI, terminal, and web GUI.

License

Notifications You must be signed in to change notification settings

emanuele-em/proxelar

Proxelar

A Man-in-the-Middle proxy written in Rust.

Intercept, inspect, and debug HTTP/HTTPS traffic with a terminal, TUI, or web interface.

CI Dependabot Updates Dependency check


Features

  • HTTPS interception — automatic CA generation and per-host certificate minting
  • Forward & reverse proxy — CONNECT tunneling or upstream URI rewriting
  • Three interfaces — terminal, interactive TUI (ratatui), web GUI (axum + WebSocket)
  • Request filtering — search and inspect request/response pairs in detail
  • Easy CA install — visit http://proxel.ar through the proxy to download the certificate

Installation

cargo install proxelar

Quick Start

# Run (forward proxy, TUI)
proxelar

# Install the CA certificate
# Option A: visit http://proxel.ar through the proxy
# Option B: manually install ~/.proxelar/proxelar-ca.pem

# Configure your system proxy to 127.0.0.1:8080

Usage

proxelar                                          # interactive TUI (default)
proxelar -i terminal                              # terminal output
proxelar -i gui                                   # web GUI at localhost:8081
proxelar -m reverse --target http://localhost:3000 # reverse proxy
proxelar -b 0.0.0.0 -p 9090                       # custom bind address and port
All CLI options
Flag Description Default
-i, --interface terminal · tui · gui tui
-m, --mode forward · reverse forward
-p, --port Listening port 8080
-b, --addr Bind address 127.0.0.1
-t, --target Upstream target (required for reverse)
--gui-port Web GUI port 8081
--ca-dir CA certificate directory ~/.proxelar
TUI key bindings
Key Action
j / k / arrows Navigate
Enter Toggle detail panel
Tab Switch Request / Response
/ Filter
Esc Close panel / clear filter
g / G Top / bottom
c Clear requests
q / Ctrl+C Quit

Contributing

Contributions are welcome! Feel free to open an issue or submit a pull request.

License

MIT

About

A programmable MITM proxy that intercepts HTTP/HTTPS traffic so you don't have to guess what your app is doing. Forward & reverse modes, TLS interception, TUI, terminal, and web GUI.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Contributors 10