November 21, 2020 infosec 2 min read Automated CLI proxy intercepts Learn how to set up mitmproxy using Docker to intercept, inspect, and manipulate HTTP requests from browsers and command-line tools. Topics: information-security mitmproxy pentesting