Introduction
HTTPeep is a cross-platform HTTP/HTTPS debugging proxy built with Rust. Learn what it does, who it's for
HTTPeep is a fast, cross-platform HTTP/HTTPS debugging proxy built with Rust and Tauri. It sits between your application and the internet, capturing and decrypting every request so you can inspect, modify, mock, and replay traffic — all through a composable rule engine you configure once and reuse forever.
Quick links
Installation
Download HTTPeep for macOS, Windows, or Linux and set up HTTPS interception in minutes.
Quick Start
Capture your first request and build your first rule in under five minutes.
Rule Engine
Learn how HTTPeep's Match → Actions → Resolve → Response pipeline works.
CLI Reference
Use httpeep-cli to capture traffic, manage rules, and integrate with CI/CD.
AI & MCP
Connect Claude, Cursor, Copilot, or OpenCode to HTTPeep via the built-in MCP server.
Troubleshooting
Fix common issues with certificate trust, proxy configuration, and CLI setup.
How HTTPeep works
Download HTTPeep and install the built-in root CA to enable HTTPS decryption. This takes about 30 seconds on any platform.
Enable the system proxy and watch requests from your browser, terminal, Docker containers, or mobile devices appear in real time.
Build a rule to mock an API endpoint, forward traffic to a staging server, or inject a delay — then save it as a YAML file to reuse forever.
Use breakpoints to pause requests mid-flight, edit headers or the body, then continue or abort. Replay captured sessions with one click.
Who HTTPeep is for
HTTPeep is designed for developers and QA engineers who regularly need to understand or change network behavior without modifying application code:
- Frontend developers mocking API responses while the backend is in development
- Full-stack developers routing production traffic to a local service for integration testing
- QA engineers simulating slow networks, random failures, and edge-case responses
- DevOps and CLI users scripting proxy operations or integrating debugging into CI/CD workflows
Key differentiators
HTTPeep takes a different approach from most HTTP debuggers:
Rule as Code. Every rule you create is a YAML file stored at ~/.httpeep/rules/. You can version-control your debugging configurations, branch them per project, and share them with your team via Git. Other tools store rules in opaque databases or project files that don't travel well.
Persistent, composable rules. Each rule follows a deterministic Match → Actions → Resolve → Response pipeline. You combine conditions and actions freely, then save the result as a reusable asset — not a one-off intercept that disappears when you close the session.
Terminal UI with full feature parity. httpeep-cli ships bundled with the desktop app and provides a fully featured TUI powered by ratatui. Rule configuration, traffic capture, and breakpoint debugging all work over SSH or in headless environments.
AI and MCP integration. A built-in MCP server lets AI agents like Claude, Cursor, and GitHub Copilot query live session data, generate mock rules, and analyze abnormal requests directly.
Linux support. HTTPeep runs natively on Linux (glibc 2.31+) including headless servers via the CLI, a gap left by several competing tools.
One-time pricing. The Professional tier is a single $59 purchase with no subscription.
Local data only. All captured traffic and configuration is stored at ~/.httpeep/. Nothing is sent to external servers.
Core features
Rule engine
Multi-condition matching with a composable action pipeline. Three resolve exits: Pass Through, Map Remote, and Map Local.
Breakpoint debugging
Pause before a request or intercept before a response. Edit headers and body live, then pass or abort.
Mock & map local
Map any request to a local file. Changes take effect immediately without restarting anything.
Map remote
Route production traffic to a local service without touching code or the hosts file.
Network throttling
Simulate latency, bandwidth limits, random failures, and disconnects to reproduce production issues locally.
DNS override
Override domain resolution per-domain without modifying the system hosts file.
CLI & terminal UI
Full-featured httpeep-cli bundled with the desktop app. Scriptable and SSH-friendly.
AI & MCP
Built-in MCP server for AI agents to query sessions, generate rules, and control the proxy.
Rule as Code
Rules are plain YAML files stored in ~/.httpeep/rules/. This means your debugging configurations work like source code: you can track changes, create branches for different environments, and review rule updates through pull requests.
~/.httpeep/rules/
├── rule.yaml # Rule configuration
├── bypass.yaml # Bypass configuration
├── dns_override.yaml # DNS override configuration
├── external_proxy.yaml # External proxy configuration
└── rate_limit.yaml # Rate limit configurationA typical rule looks like this:
- id: rule_mnhi5xkt
description: "Frontend Mock API"
enabled: true
builtin: false
stopAfterMatched: false
match:
domains:
- type: exact
value: api.example.com
originProtocol: https
requestActions: []
resolve:
type: map_local_dir
filePath: /Users/chris/mocks/api
headers:
x-httpeep-debug: '1'
responseActions:
- type: delay_response
id: action_1775140499860
enabled: true
delayMs: 500The team collaboration workflow follows naturally: save personal rules to a local Git repository, sync shared rules via a remote repository, use branches for different project rule sets, and review changes through pull requests.
See Rules as Code for a complete reference on the rule schema and team sharing workflows.