Set up transparent proxy, redirect all connections to outside server ports 443 to the transparent proxy server. Set the proxy (squid can do this) so it generates a certificate on connection using your own self-signed CA certificate to sign it. Install the CA certificate on your PC.
Now your proxy server is the man-in-the-middle - having encrypted connection from it to you and from it to the origin server, but also having access to the unencrypted content. This is exactly like a MITM attack, except you are doing it on yourself.
I have set this up for one client - in that case the proxy is there to 1)log what sites are visited and 2)block some sites (like facebook and youtube). Doing it with the proxy is better than just having a blocked IP list, because those IPs change and sites like youtube or facebook have lots of ips. I can not parse the access log, find what other sites I should block and block them.