mitmproxy --help 帮助文档

mitmproxy --help 帮助文档,第1张

usage: mitmdump [options] [filter]

positional arguments:

filter_args Filter expression, equivalent to setting both the

view_filter and save_stream_filter options.

optional arguments:

-h, --helpshow this help message and exit

--version show version number and exit

--options Show all options and their default values

--commandsShow all commands and their signatures

--set option[=value] Set an option. When the value is omitted, booleans are

set to true, strings and integers are set to None (if

permitted), and sequences are emptied. Boolean values

can be true, false or toggle.

-q, --quiet Quiet.

-v, --verbose Increase log verbosity. 打印详细日志

--mode MODE, -m MODE Mode can be "regular", "transparent", "socks5",

"reverse:SPEC", or "upstream:SPEC". For reverse and

upstream proxy modes, SPEC is host specification in

the form of "http[s]://host[:port]". 设置代理模式,如反向代理,socks5,默认regular

--no-anticache

--anticache Strip out request headers that might cause the server

to return 304-not-modified.

--no-showhost

--showhostUse the Host header to construct URLs for display.

--rfile PATH, -r PATH

Read flows from file.

--scripts SCRIPT, -s SCRIPT

Execute a script. May be passed multiple times.

--stickycookie FILTER

Set sticky cookie filter. Matched against requests.

--stickyauth FILTER Set sticky auth filter. Matched against requests.

--save-stream-file PATH, -w PATH

Stream flows to file as they arrive. Prefix path with

+ to append.

--no-anticomp

--anticompTry to convince servers to send us un-compressed data.

--flow-detail LEVEL The display detail level for flows in mitmdump: 0

(almost quiet) to 3 (very verbose). 0: shortened

request URL, response status code, WebSocket and TCP

message notifications. 1: full request URL with

response status code 2: 1 + HTTP headers 3: 2 + full

response content, content of WebSocket and TCP

messages. flow-detail显示详情的级别0,1,2,3

Proxy Options:

--listen-host HOSTAddress to bind proxy to.

--listen-port PORT, -p PORT

Proxy service port.

--no-server, -n

--server Start a proxy server. Enabled by default.

--ignore-hosts HOST Ignore host and forward all traffic without processing

it. In transparent mode, it is recommended to use an

IP address (range), not the hostname. In regular mode,

only SSL traffic is ignored and the hostname should be

used. The supplied value is interpreted as a regular

expression and matched on the ip or the hostname. May

be passed multiple times.

--allow-hosts HOSTOpposite of --ignore-hosts. May be passed multiple

times.

--tcp-hosts HOST Generic TCP SSL proxy mode for all hosts that match

the pattern. Similar to --ignore-hosts, but SSL

connections are intercepted. The communication

contents are printed to the log in verbose mode. May

be passed multiple times.

--upstream-auth USER:PASS

Add HTTP Basic authentication to upstream proxy and

reverse proxy requests. Format: username:password.

--proxyauth SPEC Require proxy authentication. Format: "username:pass",

"any" to accept any user/pass combination, "@path" to

use an Apache htpasswd file, or

"ldap[s]:url_server_ldap:dn_auth:password:dn_subtree"

for LDAP authentication.

--no-rawtcp

--rawtcp Enable/disable experimental raw TCP support. TCP

connections starting with non-ascii bytes are treated

as if they would match tcp_hosts. The heuristic is

very rough, use with caution. Disabled by default.

--no-http2

--http2 Enable/disable HTTP/2 support. HTTP/2 support is

enabled by default.

SSL:

--certs SPEC SSL certificates of the form "[domain=]path". The

domain may include a wildcard, and is equal to "*" if

not specified. The file at path is a certificate in

PEM format. If a private key is included in the PEM,

it is used, else the default key in the conf dir is

used. The PEM file should contain the full certificate

chain, with the leaf certificate as the first entry.

May be passed multiple times.

--cert-passphrase PASS

Passphrase for decrypting the private key provided in

the --cert option.

--no-ssl-insecure

--ssl-insecure, -kDo not verify upstream server SSL/TLS certificates.

--key-size KEY_SIZE TLS key size for certificates and CA.

Client Replay:

--client-replay PATH, -C PATH

Replay client requests from a saved file. May be

passed multiple times.

Server Replay:

--server-replay PATH, -S PATH

Replay server responses from a saved file. May be

passed multiple times.

--no-server-replay-kill-extra

--server-replay-kill-extra

Kill extra requests during replay.

--no-server-replay-nopop

--server-replay-nopop

Don't remove flows from server replay state after use.

This makes it possible to replay same response

multiple times.

--no-server-replay-refresh

--server-replay-refresh

Refresh server replay responses by adjusting date,

expires and last-modified headers, as well as

adjusting cookie expiration.

Map Remote:

--map-remote PATTERN, -M PATTERN

Map remote resources to another remote URL using a

pattern of the form "[/flow-filter]/url-

regex/replacement", where the separator can be any

character. May be passed multiple times.

Map Local:

--map-local PATTERN Map remote resources to a local file using a pattern

of the form "[/flow-filter]/url-regex/file-or-

directory-path", where the separator can be any

character. May be passed multiple times.

Modify Body:

--modify-body PATTERN, -B PATTERN

Replacement pattern of the form "[/flow-

filter]/regex/[@]replacement", where the separator can

be any character. The @ allows to provide a file path

that is used to read the replacement string. May be

passed multiple times.

Modify Headers:

--modify-headers PATTERN, -H PATTERN

Header modify pattern of the form "[/flow-

filter]/header-name/[@]header-value", where the

separator can be any character. The @ allows to

provide a file path that is used to read the header

value string. An empty header-value removes existing

header-name headers. May be passed multiple times.

from selenium import webdriver

from pyvirtualdisplay import Display

from selenium.webdriver.chrome.options import Options

from selenium.webdriver.common.desired_capabilities import DesiredCapabilities

#_____________________基本设定___________________________CHROME_DRIVER_PATH = r'/usr/bin/chromedriver'

PROXY = "http://127.0.0.1:8080"

#_____________________启动参数___________________________

options = webdriver.ChromeOptions()

options.add_argument('--headless')

options.add_argument('--disable-gpu')

options.add_argument("window-size=1024,768")

options.add_argument("--no-sandbox")

#_____________________代理参数___________________________

desired_capabilities = options.to_capabilities()

desired_capabilities['acceptSslCerts'] = True

desired_capabilities['acceptInsecureCerts'] = True

desired_capabilities['proxy'] = {

"httpProxy": PROXY,

"ftpProxy": PROXY,

"sslProxy": PROXY,

"noProxy": None,

"proxyType": "MANUAL",

"class": "org.openqa.selenium.Proxy",

"autodetect": False,

}

#_____________________启动浏览器___________________________driver = webdriver.Chrome(chrome_options=options,

executable_path=CHROME_DRIVER_PATH,

desired_capabilities = desired_capabilities,

)

for i in range(1):driver.get('https://www.iplocation.net')

contant = driver.page_sourcedriver.save_screenshot('hello.png')

print(contant)driver.close()driver.quit()

mitmdump -p 8080


欢迎分享,转载请注明来源:内存溢出

原文地址:https://54852.com/bake/11184509.html

(0)
打赏 微信扫一扫微信扫一扫 支付宝扫一扫支付宝扫一扫
上一篇 2023-05-14
下一篇2023-05-14

发表评论

登录后才能评论

评论列表(0条)

    保存