rep+ 作成者: Bour Abdelhadi
rep+ - Capture, modify, and replay HTTP requests in Firefox DevTools with AI-powered security analysis.
拡張機能メタデータ
スクリーンショット
この拡張機能について
rep+ is a powerful Chrome DevTools extension that brings Burp Suite Repeater functionality directly into your browser. Now enhanced with AI, it helps developers, security researchers, and bug bounty hunters test and analyze HTTP requests smarter and faster—no proxy setup required.
With rep+ you can:
- Capture and replay HTTP requests from any tab, without proxy setup
- Group, filter, block, and search requests using text or regex
- Convert data inline (Base64, URL encode/decode, JWT decode, Hex/UTF‑8)
- Inspect responses in multiple formats with syntax highlighting and line numbers
- Passively extract hidden endpoints from JavaScript
- Discover query, body, header, and path parameters with risk classification and confidence scoring
- Suppress false positives by ignoring common frameworks, libraries, telemetry, and generic fields
- Detect secrets in JavaScript using high‑coverage Kingfisher rules
- Export endpoints, parameters, and secrets to CSV or Postman
- Search deeply inside responses and JavaScript
- Run built‑in automated attacks (Sniper, Battering Ram, Pitchfork, Cluster Bomb)
- Use AI for request explanations and attack suggestions via API or local LLM (Ollama)
- AI‑powered request analysis, modification, and attack suggestions
- Per‑request isolated chat with cross‑request references
- One‑click AI‑driven request edits with visual feedback
- Local or API‑based LLM support with aggressive token optimization
- Automatically remove duplicate requests during capture to eliminate noise and keep only unique traffic
Why install it?
- Works natively inside your browser
- Designed for speed, clarity, and real pentesting workflows
- Helps you uncover security issues and understand application behaviour faster
- Ideal for bug bounty hunters, red teamers, AppSec, and curious devs
With rep+ you can:
- Capture and replay HTTP requests from any tab, without proxy setup
- Group, filter, block, and search requests using text or regex
- Convert data inline (Base64, URL encode/decode, JWT decode, Hex/UTF‑8)
- Inspect responses in multiple formats with syntax highlighting and line numbers
- Passively extract hidden endpoints from JavaScript
- Discover query, body, header, and path parameters with risk classification and confidence scoring
- Suppress false positives by ignoring common frameworks, libraries, telemetry, and generic fields
- Detect secrets in JavaScript using high‑coverage Kingfisher rules
- Export endpoints, parameters, and secrets to CSV or Postman
- Search deeply inside responses and JavaScript
- Run built‑in automated attacks (Sniper, Battering Ram, Pitchfork, Cluster Bomb)
- Use AI for request explanations and attack suggestions via API or local LLM (Ollama)
- AI‑powered request analysis, modification, and attack suggestions
- Per‑request isolated chat with cross‑request references
- One‑click AI‑driven request edits with visual feedback
- Local or API‑based LLM support with aggressive token optimization
- Automatically remove duplicate requests during capture to eliminate noise and keep only unique traffic
Why install it?
- Works natively inside your browser
- Designed for speed, clarity, and real pentesting workflows
- Helps you uncover security issues and understand application behaviour faster
- Ideal for bug bounty hunters, red teamers, AppSec, and curious devs
2 人のレビュー担当者が 5 と評価しました
権限とデータ
必要な権限:
- 開いたタブのユーザーデータへアクセスするため開発ツールを展開
任意の許可設定:
- すべてのウェブサイトの保存されたデータへのアクセス
データ収集:
- 開発者によると、この拡張機能はデータ収集を必要としません。
詳しい情報
- アドオンリンク
- バージョン
- 1.3.1
- サイズ
- 558.13 KB
- 最終更新日
- 16日前 (2026年1月8日)
- 関連カテゴリー
- ライセンス
- MIT License
- バージョン履歴
- タグ
- コレクションへ追加