Lands In App Store

After several months testing and improving features, is now officially available for purchase from Mac App Store. It has been an interesting journey and we can proudly say that we have put all of our hearts into making this tool.

Screenshot 01 was born on 3rd February 2014 out of necessity - original blog post here. While there were plenty of proxies such as Burp, ZAP and Charles, none of them were native to OS X. These proxies were written in Java and because of that none of them were taking advantage of the freely available, native and quite awesome features of the Mac OS - making them somewhat inferior in our eyes. Given that we spend most of our time testing, researching and building web security tools primarily on Mac the need for a native OS X proxy had become an itch we could no longer bear.

After several months of hard work and two unsuccessful launches on the App Store we are happy to announce that has arrived and it is looking good. The tool has been available on the App Store since last Thursday and it had already gathered a lot of traction. The community was also very supportive, bombarding us with ideas how to make the tool even better.

The key features of the proxy are summarised here:

  • It is completely native from start to finish. It is written in compact and optimised Objective-C.
  • is fast because of its native roots. You cannot beat native code on performance.
  • The tool is fully integrated into Mac OS X. uses the Keychain APIs, native file formats and native user interface components.
  • There is SSL interception out of the box. Everything that has to do with SSL is controlled from the Keychain.
  • The tool comes with colouring schemes, rich request and response editor and other UI tools that simplify usage.
  • The interception mode allows you to cut through requests and responses and modify data in transit.
  • is non-blocking from start to finish. You do not need to wait for things to be queued in any order.
  • There is so much more...

Enjoy the tool and of course do let us know if you find bugs.