You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For penetration testers and hackers, there is a need, for converting HTTP/2 traffic to HTTP/3 traffic. Because hackers tools like Burp Suite, does not support H3. So this idea helps hackers to be able to test and hack HTTP/3 websites with proxy tools like Burp Suite.
Proposal
It will be much helpful, if mitmproxy listens for HTTP2 (e.g. 443 TCP) and after getting the request and parsing it, convert it to HTTP/3 server which we have specified using for example --h2-proxy-address 127.0.0.1:443 --up-stream-server h3.website.com:443
Alternatives
Currently I do not have alternate solution for this idea.
The text was updated successfully, but these errors were encountered:
Problem Description
For penetration testers and hackers, there is a need, for converting HTTP/2 traffic to HTTP/3 traffic. Because hackers tools like Burp Suite, does not support H3. So this idea helps hackers to be able to test and hack HTTP/3 websites with proxy tools like Burp Suite.
Proposal
It will be much helpful, if mitmproxy listens for HTTP2 (e.g. 443 TCP) and after getting the request and parsing it, convert it to HTTP/3 server which we have specified using for example
--h2-proxy-address
127.0.0.1:443--up-stream-server
h3.website.com:443Alternatives
Currently I do not have alternate solution for this idea.
The text was updated successfully, but these errors were encountered: