Would you be after something like Achilles?
I tend to use it for demonstrating man in the middle attacks, but it can act as an SSL proxy which allows you to view or alter anything passing through it. Good for web application spoofing attacks as well.
_________________________
Rory
MkIIa, blue lit buttons, memory upgrade, 1Tb in Subaru Forester STi
MkII, 240Gb in Mark Lord dock
MkII, 80Gb SSD in dock