Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.

Features
- Machine-in-the-middle (MITM) HTTP proxy, with logs and advanced search
- HTTP client for manually creating/editing requests, and replay proxied requests
- Scope support, to help keep work organized
- Easy-to-use web based admin interface
- Project based database storage, to help keep work organized
Hetty is under active development. Check the backlog for the current status.
Are you pen testing professionaly in a team? I would love to hear your thoughts on tooling via this 5 minute survey. Thank you!
Getting started
The Getting started doc has more detailed install and usage instructions.
Installation
The quickest way to install and update Hetty is via a package manager:
brew install hettysoft/tap/hetty
Linux
sudo snap install hetty
Windows
scoop bucket add hettysoft https://github.com/hettysoft/scoop-bucket.git
scoop install hettysoft/hetty
Other
Alternatively, you can download the latest release from GitHub for your OS and architecture, and move the binary to a directory in your $PATH
. If your OS is not available for one of the package managers or not listed in the GitHub releases, you can compile from source (link coming soon) or use a Docker image (link coming soon).
Usage
Once installed, start Hetty via:
hetty
Read the Getting started doc for more details.
To list all available options, run: hetty --help
:
$ hetty --help
Usage:
hetty [flags] [subcommand] [flags]
Runs an HTTP server with (MITM) proxy, GraphQL service, and a web based admin interface.
Options:
--cert Path to root CA certificate. Creates file if it doesn't exist. (Default: "~/.hetty/hetty_cert.pem")
--key Path to root CA private key. Creates file if it doesn't exist. (Default: "~/.hetty/hetty_key.pem")
--db Database directory path. (Default: "~/.hetty/db")
--addr TCP address for HTTP server to listen on, in the form \"host:port\". (Default: ":8080")
--chrome Launch Chrome with proxy settings applied and certificate errors ignored. (Default: false)
--verbose Enable verbose logging.
--json Encode logs as JSON, instead of pretty/human readable output.
--version, -v Output version.
--help, -h Output this usage text.
Subcommands:
- cert Certificate management
Run `hetty <subcommand> --help` for subcommand specific usage instructions.
Visit https://hetty.xyz to learn more about Hetty.
hetty (this link opens in a new window) by dstotijn (this link opens in a new window)
Hetty is an HTTP toolkit for security research.