Both of the above actually record/decrypt/modify/replay HTTPS to!! You’d need to point the application you are monitoring to this proxy. If nothing else uses that proxy the log would be application/process specific and another upside to this approach is that one could also run the monitor/logger on a different machine.