Last active
April 26, 2025 00:01
-
-
Save h0ffy/7148d917abf1a1ba126899170bea6bd3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#set -x | |
set -e | |
PASSWORD="jenny$((RANDOM))" | |
echo "[+] Cleaning ~/.mitmproxy" | |
rm -rf ~/.mitmproxy | |
mkdir -p ~/.mitmproxy | |
cd ~/.mitmproxy | |
echo "[+] Making key" | |
openssl genrsa -out ca.key 4096 | |
echo "[+] Make root certificate" | |
openssl req -x509 -new -days 3650 -key ca.key -sha256 \ | |
-out ca.crt \ | |
-subj "/CN=Jenny Proxy CA/O=JLAB/C=XX" | |
echo "[+] Make DH param" | |
openssl dhparam -out mitmproxy-dhparam.pem 2048 | |
echo "[+] Make ca.pem with cert and key in mitmproxy-ca.pem" | |
cat ca.key ca.crt > mitmproxy-ca.pem | |
echo "[+] Verifying mitmproxy-ca.pem" | |
openssl x509 -in mitmproxy-ca.pem -noout -text > /dev/null || { echo "Error en certificado fusionado"; exit 1; } | |
echo "[+] Make mitmproxy-ca-cert.p12" | |
openssl pkcs12 -export -out mitmproxy-ca-cert.p12 -inkey mitmproxy-ca.pem -in ca.crt -passout pass:$PASSWORD 2>&1 1>>/dev/null && echo "[OK]" || echo "[ERROR]" | |
echo "[+] Ready happy hacking!!! ~/.mitmproxy" | |
echo "[+] Make Distribution Files" | |
mkdir -p /tmp/mitmproxy_export | |
cp -f mitmproxy-dhparam.pem mitmproxy-ca.pem ca.crt mitmproxy-ca-cert.p12 /tmp/mitmproxy_export | |
tar -czf ~/mitmproxy-distrib.tar.gz -C /tmp mitmproxy_export 2>&1 1>>/dev/null && echo "[OK]" || echo "[ERROR]" | |
echo "[+] Distribution Files with password ($PASSWORD)" | |
ls -lah ~/mitmproxy-distrib.tar.gz |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment