We have collection of more than 1 Million open source products ranging from Enterprise product to
small libraries in all platforms. We aggregate information from all open source repositories.
Search and find the best for your needs. Check out projects section.
Mitm.js is a library for Node.js (and Io.js) to intercept and mock outgoing network TCP and HTTP connections. Mitm.js intercepts and gives you a Net.Socket to communicate as if you were the remote server. For HTTP requests it even gives you Http.IncomingMessage and Http.ServerResponse — just like you're used to when writing Node.js servers. Except there's no actual server running, it's all just In-Process Interception™. Intercepting connections and requests is extremely useful to test and ensure your code does what you expect. Assert on request parameters and send back various responses to your code without ever having to hit the real network. Fast as hell and a lot easier to develop with than external test servers.
A multipurpose, full-featured, middleware-oriented and hackable HTTP/S and WebSocket proxy with powerful built-in features such as versatile routing layer, traffic interceptor and replay to multiple backends, built-in balancer, traffic retry/backoff logic, hierarchical configuration, among others. Built for node.js/io.js.rocky can be fluently used programmatically or via command-line interface. It's framework agnostic, but you can optionally plug in with connect/express apps.
Tiny node.js module to intercept, modify and/or ignore chunks of data and events in any readable compatible stream before it's processed by other stream consumers (e.g: via pipe()).It becomes particularly useful to deal with net/http/fs streams.
This is an example of a Bonjour/Zeroconf Man-in-the-Middle attack. This software showcases the attack of an IPP enabled printer. It will intercept all print jobs sent to the target printer.This attack only works for Bonjour/Zeroconf and IPP enabled printers. Only jobs sent from clients that have the printer configured using Bonjour/Zeroconf will have their jobs intercepted.
A simple DNS proxy that lets you intercept domains and route them to whatever IP you decide.You probably need to run the above example with sudo as we need to listen to port 80 and 53. Now change your local DNS server to 127.0.0.1 and visit http://www.google.com in your browser.
Run this and it will automatically listen at port 8128. This example will work as both a regular HTTPS proxy (via CONNECT) as well as a transparent HTTPS proxy (via SNI). The proxy will log bodies for all HTTP responses, and only HTTPS responses that fit '*.github.com' (note that the asterisk only works one level deep, see the SSL Certificates section).
Library for easy renewing of access tokens in OAuth's refresh token flow. This library will monkey patch fetch on your target environment and will try to resolve unauthorized requests automatically by renewing the current access token and then retrying an initial fetch operation. Note: This library expects that fetch and promise api's are available at target environment. You should provide a polyfill when necessary.
Intercept $http request from the website without modifying code or installing plugins. If you have a method on the scope that uses $http service to make Ajax calls, you can intercept and return mock values without modifying the application or installing additional plugins. Just drive this ng-wedge into your app from the browser console and set up the fake $http for this particular scope's method. You can return different status, or mock data or even slow down the responses by any amount.
Interceptor library for the native fetch command inspired by angular http interceptors. fetch-intercept monkey patches the global fetch method and allows you the usage in Browser, Node and Webworker environments.