I love the look of this, I cant even remember all the times I’ve run across applications out in the wild that were built without any thought about testing until long after the original devs are gone. All you have is production traffic and reverse engineering. It’s a real pain, and I would love to have more tools to attack this problem when it comes up.
So how open is that alpha? I’d really love to try this out.
Reverse engineering protocols has morphed from a hobby to a full time job. I've spent a lot of time going through logs, looking at data and knowing that I am not looking at the TCP level request and response. So we are trying to solve that problem. :)
Please send a note to hello@speedscale.com so we can get the details of your environment and determine if it is a fit for our alpha.
So how open is that alpha? I’d really love to try this out.