top | item 41651732 (no title) seanc | 1 year ago In the old days we'd use tcpdump and wireshark for this, but nowadays everything is encrypted up in the application layer so you need this kind of thing. Or tricky key dumping hacks. discuss order hn newest toomuchtodo|1 year ago https://www.charlesproxy.com/ ?
toomuchtodo|1 year ago