Some apps pin their certs, which may break them with Man-In-The-Middle proxy this tool uses.<p>Author: please consider adding a blurb about that on your page.
This looks great! Very happy to see that kind of software built with mitmproxy. If there's anything we can do to make your downstream life easier, feel free to reach out anytime. :)
I already do this for myself with far fewer dependencies (see NCC's requirements.txt). I do not need to install Python. This makes it easier for me to set this up on computers with limited storage and memory. Plus haproxy and sslsplit are much faster than mitmproxy. The OS I prefer does not have Python in the base system.
Could this be useful for doing dynamic exercising of apps in emulators to profile what kind of data they share?<p>I'm wondering if potentially it could be a way to close the loop on training a deep reinforcement learning model to exercise clicking on app UI's and using Solitude data over the network as the state/reward cycle.
If I’m understanding correctly, you will only be notified if there is a match to whatever the user added to the Yara rules.<p>Will the MySQL database still contain any/all network traffic and be viewable with a sql database browser?