Marmota is a cross-platform, high-performance Man-in-the-Middle (MITM) proxy and HTTP/HTTPS traffic analyzer. Built to capture, inspect, and manipulate HTTP/1.1 and HTTP/2 traffic, it provides developers and security engineers with deep visibility into network interactions between clients and servers.
Note: The frontend UI is currently transitioning from Spanish to English. You may encounter minor localization inconsistencies in the current build.
You can download the latest executable binaries for Windows, Linux, and macOS from the Releases page.
🐧 Linux Users: Which version should I download?
Due to recent updates in Linux distributions, we provide two versions of Marmota. Please choose the one that matches your system:
Download
webkit4.1(Modern)
- Use this if you are on: Ubuntu 24.04 or newer, Mint 22+, Debian 13, Fedora 40+, or rolling releases like Arch Linux.
Download
webkit4.0(Legacy)
- Use this if you are on: Ubuntu 22.04 or older, Mint 21, Debian 12 or older, or Fedora 39 or older.
Note: Debian/Ubuntu-based users should download the
.debfile. Fedora/RedHat-based users should download the.rpmfile.
Marmota acts as a local proxy, capturing all routed requests and responses. The interface provides detailed introspection of headers, payloads, and connection metadata.
Unlike tools that filter data in the DOM, Marmota's filtering engine runs natively in the Go backend for maximum efficiency.
Contains, Does not contain, Exactly equals, Does not exactly equal, Starts with, Ends with.Request/Response, Headers, Bodies, Method, Host, Port, Scheme, or Path.AND / OR operators.Easily replicate captured requests across different environments. Marmota parses the captured raw request and instantly generates ready-to-use code snippets:
fetch API, axios, or standalone Header objects.requests, httpx, or standalone Dictionary headers.When inspecting HTTP requests or responses, Marmota automatically detects common payload structures (application/json, text/html, application/x-www-form-urlencoded, and multipart/form-data). It applies real-time syntax highlighting and structural indentation (Pretty Print) to transform raw data into a highly readable, developer-friendly format.
Navigate massive payloads effortlessly with the built-in inspection search engine. When a specific entry is selected, you can search for strings with instant visual text highlighting. The search scope is fully adjustable to reduce noise:
Request Head, Request Body, Response Head, or Response Body.Send intercepted requests to the Repeater module to modify parameters, headers, or bodies and replay them against the server. The module includes basic syntax validation, surfacing warnings and errors for malformed HTTP requests prior to execution.
Bookmark critical requests in the "Saved Requests" tab. This acts as a persistent list during your current session, isolating important traffic from the main HTTP History log. Note: This is volatile storage; data is cleared upon application exit.
To decrypt and inspect HTTPS traffic, Marmota generates a local Certificate Authority (CA). For the proxy to function correctly, this CA certificate must be installed and trusted either at the OS level (Keychain/Certificate Manager) or directly within the client browser's certificate store.
Marmota includes an option to bypass upstream X.509 certificate validation (equivalent to InsecureSkipVerify in Go).
Configure the proxy by specifying a listening port and binding it to:
localhost (127.0.0.1) for local-only traffic.0.0.0.0) to capture traffic from external devices on the same LAN.Clone the repository:
git clone https://github.com/BoolerLogic/marmota.git
cd marmota
Build the application for your current OS:
wails build
The compiled binary will be located in the build/bin/ directory.
To run Marmota in development mode with hot-reloading:
wails dev
This project is licensed under the MIT License - see the LICENSE file for details.