This is not using system proxy way. because some apps can choose not use system proxy. This is using TUN way. So all TCP can be captured to mitmproxy.<p>Requires:<p>[Desktop]: <a href="https://github.com/mitmproxy/mitmproxy" rel="nofollow">https://github.com/mitmproxy/mitmproxy</a><p>[Mobile iOS]: <a href="https://apps.apple.com/us/app/id1528537342" rel="nofollow">https://apps.apple.com/us/app/id1528537342</a><p>[Mobile Android]: <a href="https://play.google.com/store/apps/details?id=com.txthinking.mitmproxy" rel="nofollow">https://play.google.com/store/apps/details?id=com.txthinking...</a><p>- Intercept HTTP & HTTPS requests and responses and modify them on the fly<p>- Save complete HTTP conversations for later replay and analysis<p>- Replay the client-side of an HTTP conversations<p>- Replay HTTP responses of a previously recorded server<p>- Reverse proxy mode to forward traffic to a specified server<p>- Transparent proxy mode on macOS and Linux<p>- Make scripted changes to HTTP traffic using Python<p>- SSL/TLS certificates for interception are generated on the
fly<p>- And much, much more…