Hi - I have an application (.exe) that was written in Python. It makes a HTTPS call out and data is returned in JSON. With Fiddler running, I can run the program, it makes 2 web calls and bring back data.
As soon as I enable Fiddler for HTTPS and Decryption, the program won't return data.
I enabled the CERT from Fiddler and made sure the proxy was correct in my LAN settings. Any ideas? (Windows 10)
I am having a little bit of an issue. Our software uses an embedded browser. I am able to capture all of the traffic with fiddler. But there's one new screen that our vendor has added without giving us notice and I have to somehow manually input the data but I do not know how to do this with fiddler. I can view the screen in fiddler log via webview but can not enter what I need to do. I was told by Fiddler they do support this and was wondering is someone could give me some advice.
Thank you
Ever since following the technique outlined in http://www.telerik.com/forums/how-to-automatically-re-enable-fiddle-as-system-proxy to get automatic reconnection, I'm running into occasional (once a week?) Uncaught Exception errors in fiddler.
version: 4.6.20173.38786
error message with a stack trace attached, but the core of it is
Cannot access a disposed object. Object name: 'WinHttpAutoProxy'
Any advice for debugging?

Fiddler tries to install an update after startup. The update fails because the 'uninst.exe' gives an 'error' : This App Can't run on your PC. . Running the unisnt manually, same problem. Current version : Fiddler Web Debugger (v4.6.2.3) Built: Thursday, April 14, 2016.
How do I get it uninstallled?
Thanks
Ben

Our build team isn't too happy with our current consumption method.
We have purchased the enterprise license, so is there a fiddler core nuget that we could get access to?
I see there used to be one on nuget.org, but it's gone now...
Hi,
For scenarios where we have vendors or customers that may want to share fiddler traces, is there a command or process we can have them put a fiddler trace through that would rip out all MSISAuth and MSISAuth1 header values (which will contain oAuth Access tokens)?
I'm aware of the ability to remove the headers during capture, but the scenario I'm looking to work on is where we already have a trace and want to be sure we're removing headers that carry access tokens in the request data and it isn't just one or two requests (let's say hundreds) otherwise I would just delete the header value manually.
Thanks!
