Demonstrations of sslsniff.py This tool traces the OpenSSL functions SSL_READ and SSL_WRITE. Data passed to this functions is printed as plain text. Useful, for example, to sniff HTTP before encrypted with SSL. Output of tool executing in other shell "curl https://example.com" % sudo python sslsniff.py FUNC TIME(s) COMM PID LEN SSL_WRITE 0.000000000 curl 12915 75 ----- DATA ----- GET / HTTP/1.1 Host: example.com User-Agent: curl/7.50.1 Accept: */* ----- END DATA ----- SSL_READ 0.127144585 curl 12915 333 ----- DATA ----- HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Type: text/html Date: Tue, 16 Aug 2016 15:42:12 GMT Etag: "359670651+gzip+ident" Expires: Tue, 23 Aug 2016 15:42:12 GMT Last-Modified: Fri, 09 Aug 2013 23:54:35 GMT Server: ECS (iad/18CB) Vary: Accept-Encoding X-Cache: HIT x-ec-custom-error: 1 Content-Length: 1270 ----- END DATA ----- SSL_READ 0.129967972 curl 12915 1270 ----- DATA ----- Example Domain