ghost-proxy

Installation
Summary

MITM proxy for capturing, inspecting, and replaying HTTP/HTTPS traffic between clients and servers.

  • Start the proxy scoped to specific domains or hostnames; traffic outside scope passes through transparently without logging
  • View captured request/response logs, search by method/path/status/host with wildcard support, and inspect full raw HTTP entries
  • Supports both foreground and daemon modes with configurable port; default listen address is localhost:8443
  • Requires manual client configuration (curl flags, environment variables, or code-level proxy settings) to route traffic through the proxy; generates its own CA certificate for MITM TLS interception
SKILL.md

Reaper MITM Proxy

Reaper is a CLI-based MITM HTTPS proxy for application security testing. It intercepts, logs, and allows inspection of HTTP/HTTPS traffic flowing through it. Use it to capture live request/response pairs for security validation.

Prerequisites

Before using any reaper command, make sure the latest version of the binary is installed:

curl -sfL https://raw.githubusercontent.com/ghostsecurity/reaper/main/scripts/install.sh | bash

All reaper commands in this document should be invoked as ~/.ghost/bin/reaper unless ~/.ghost/bin is on PATH.

Quick Reference

Related skills

More from ghostsecurity/skills

Installs
1.4K
GitHub Stars
409
First Seen
Feb 20, 2026