Proxy Tooling
How to proxy CLI tools, code, and other apps
Overview
Proxying tooling like the AWS CLI, Nmap, or Python scripts is a great way to understand what's happening under the hood.
Each tool, code, and app may not support the same methods of inspection so you may need to do some research.
Getting a Certificate from Caido (or BurpSuite)
First, we need to download the certificate from Caido

I've placed mine in my downloads folder here /Users/tyler/Downloads/caido_ca.crt
Proxying Tooling
We need to add the following environment variables either to your current terminal session or to your shell profile e.g., ~/.zshrc
Make sure this is the IP : Port that your proxy tool is runnnig on (Caido / BurpSuite)
AWS CLI
We need to point the AWS CLI to our certificate otherwise we'll see SSL errors.
Alternatively, we can use this which will work with other tools like Python as well,
Now, just run any command in terminal and we should see it in Caido / BurpSuite,
And in Caido, under Proxy > HTTP History we'll see,
Request
Response
curl
One way to proxy curl is by specifying the proxy in the command
nmap
We can proxy nmap by specifying the proxy as a parameter
metasploit
We can proxy metasploit exploits by setting the proxy in the exploit's configuration e.g.,
Proxychains
Proxychains enables us to easily proxy tools as well which is useful for tooling that may not have a proxy option (this can also work for tools that do).
Update your proxy config file found in:
Linux:
/etc/proxychains.confmacOS:
/opt/homebrew/etc/proxychains.conf(assuming installed via Homebrew)
Optionally, uncomment quite_mode to reduce the output when running proxychains (can also use -s )
Then run your commands
And this will show up in Caido / BurpSuite.
Last updated
Was this helpful?