__mitmdump__ is the command-line companion to mitmproxy. It provides tcpdump-like functionality to let you view, record, and programmatically transform HTTP traffic. See the _--help_ flag output for complete documentation. # Examples ## Saving traffic
> mitmdump -w outfile
Start up mitmdump in proxy mode, and write all traffic to __outfile__. ## Filtering saved traffic
> mitmdump -nr infile -w outfile "~m post"
Start mitmdump without binding to the proxy port (_-n_), read all flows from infile, apply the specified filter expression (only match POSTs), and write to outfile. ## Client replay
> mitmdump -nc outfile
Start mitmdump without binding to the proxy port (_-n_), then replay all requests from outfile (_-c filename_). Flags combine in the obvious way, so you can replay requests from one file, and write the resulting flows to another:
> mitmdump -nc srcfile -w dstfile
See the [Client-side Replay](@!urlTo("clientreplay.html")!@) section for more information. ## Running a script
> mitmdump -s examples/add_header.py
This runs the __add_header.py__ example script, which simply adds a new header to all responses. ## Scripted data transformation
> mitmdump -ns examples/add_header.py -r srcfile -w dstfile
This command loads flows from __srcfile__, transforms it according to the specified script, then writes it back to __dstfile__.