What is Proxelar?
Proxelar sits between your application and the internet, giving you full visibility into every HTTP/HTTPS request — and the power to transform it on the fly with Lua.
Your App ──► Proxelar :8080 ──► Internet
│
Inspect · Modify · Mock
Useful for debugging APIs, reverse engineering third-party services, testing mobile apps, injecting headers, mocking responses, or automating any request/response transform without touching your source code.
Features
- Lua scripting — write
on_request/on_responsehooks to modify, block, or mock traffic at runtime - HTTPS interception — automatic CA generation and per-host certificate minting
- Forward & reverse proxy — CONNECT tunneling or upstream URI rewriting
- Three interfaces — terminal (stdout), interactive TUI (ratatui), web GUI (axum + WebSocket)
- WebSocket inspection — connections captured alongside HTTP traffic; browse frames by direction, opcode, and payload
- Column-scoped filtering —
time:14:,proto:https,method:POST,host:github,path:/api,status:404,type:json,size:1KB,duration:slowor plain text search - Easy CA install — visit
http://proxel.arthrough the proxy to download and install the root cert
Installation
Homebrew (macOS / Linux)
Cargo
Docker / Podman
# Web GUI
# Terminal
The -v ~/.proxelar:/root/.proxelar mount reuses your existing trusted CA certificate so you won't get browser warnings.
Quick Start
1. Start the proxy
2. Install the CA certificate
Visit http://proxel.ar while routing traffic through the proxy — it serves the cert with install instructions.
Or install it manually: ~/.proxelar/proxelar-ca.pem
3. Configure your system proxy
Set HTTP and HTTPS proxy to 127.0.0.1:8080 in your OS, browser, or tool of choice.
Traffic will start appearing in the TUI immediately.
Interfaces
Usage
| Flag | Description | Default |
|---|---|---|
-i, --interface |
terminal · tui · gui |
tui |
-m, --mode |
forward · reverse |
forward |
-p, --port |
Listening port | 8080 |
-b, --addr |
Bind address | 127.0.0.1 |
-t, --target |
Upstream target (required for reverse) | — |
--gui-port |
Web GUI port | 8081 |
--ca-dir |
CA certificate directory | ~/.proxelar |
-s, --script |
Lua script for request/response hooks | — |
--body-capture-limit |
Maximum body bytes buffered for capture/editing; use free, unlimited, or none for unlimited |
free |
| Key | Action |
|---|---|
j / k / arrows |
Navigate |
Enter |
Open detail panel; press again to focus and scroll |
Tab |
Switch Request / Response / Frames tabs |
/ |
Filter (plain text or column:value) |
r |
Replay selected request |
Esc |
Close panel / clear filter |
g / G |
Top / bottom |
c |
Clear requests |
? |
Keybinding help |
q / Ctrl+C |
Quit |
Scripting
Write Lua scripts to intercept and transform traffic. Define on_request and/or on_response hooks:
local blocked =
More examples in examples/scripts/ — header injection, cookie stripping, HTML rewriting, request body modification, traffic logging, and more. Full scripting API reference at proxelar.micheletti.io.
Documentation
Latest release: Proxelar 0.4.4 — Body Capture Limits for Large Traffic
Full documentation at proxelar.micheletti.io:
- Getting started
- Forward & reverse proxy modes
- Lua scripting API reference
- CA certificate installation
Contributing
Contributions are welcome. Open an issue or submit a pull request.