About
In order to assess the security of an application, security testing software are used and may acts as:
- and many other role thanks to plugin
They can act as Manipulator-in-the-middle Proxy that allows to:
- see all of the requests you make to a web app
- modify and send them
- see all of the responses you receive from it.
List
- Zed Attack Proxy (Open Source, Java) 1)
- Burp (Java Paid)