This is a simple proxy that sends messages received and sent by both parties through a proxy, allowing meddling ability for debugging and reverse-engineering.
So far only HTTP proxy and SOCKS5 proxies are supported.
- Sends messages through a proxy
- Supports injection of messages
- Open the manifest and look for
path. In Linux and macOS, manifests can be found inNativeMessagingHostsdirectory under Chrome/Chromium configs directory (in Linux:/home/USER/.config/chromium/NativeMessagingHosts). - Copy its value and write the config file in your config directory. (default in Linux:
/home/USER/.config/nmproxy.cfg):
command: '/home/USER/.bin/myextension_host'
proxy: socks5://127.0.0.1:1080/
log: /home/USER/nmproxy.log
- Now change the
pathin manifest to point to NativeMessagingProxy. - Start a
mitmproxyinstance on the address that you specified in the config. - Run Chrome/Chromium.
command: full path to single executable without args.proxy: proxy URI with these protocols:socks5,socks5h,http,https. for example:socks5://127.0.0.1:1080log: file path andstderr.
You may specify custom configuration file path through NMPROXY_CONFIG environment variable.
Code from miku's gist has been used to enable usage of HTTP(S) proxies.
MIT