Mobile Interceptor (PT) от SolidLeoz
HTTP request interceptor and repeater for authorized penetration testing on Firefox Android. Capture, inspect, modify and replay HTTP traffic from scoped target domains.
Метаданные расширения
Скриншоты
Об этом расширении
Mobile Interceptor (PT) is a mobile-first HTTP traffic interceptor designed for
authorized penetration testing on Firefox Android.
Features:
- INTERCEPT mode — Block HTTP requests, inspect and edit them (method, URL,
headers, body), then forward or drop
- OBSERVE mode — Passively capture traffic without blocking (read-only)
- Repeater — Save and replay requests with modifications for manual testing
- Notes — Save request/response pairs for later analysis
- Scope control — Allowlist-based domain filtering (default-deny: nothing is
intercepted until you configure targets)
- Audit log — Track all actions (forward, drop, mode changes, policy changes)
Security & Privacy:
- All data stored locally only (browser.storage.local) — no remote servers, no
telemetry
- Sensitive headers (Authorization, Cookie, etc.) are automatically redacted in
display and export
- Rate limiting on request replay
- Retention limits on all stored data (notes, repeater, audit log)
- OFF by default — no interception until explicitly enabled by the user
Important: This tool is intended exclusively for authorized security testing.
Only use it on systems you have explicit permission to test.
authorized penetration testing on Firefox Android.
Features:
- INTERCEPT mode — Block HTTP requests, inspect and edit them (method, URL,
headers, body), then forward or drop
- OBSERVE mode — Passively capture traffic without blocking (read-only)
- Repeater — Save and replay requests with modifications for manual testing
- Notes — Save request/response pairs for later analysis
- Scope control — Allowlist-based domain filtering (default-deny: nothing is
intercepted until you configure targets)
- Audit log — Track all actions (forward, drop, mode changes, policy changes)
Security & Privacy:
- All data stored locally only (browser.storage.local) — no remote servers, no
telemetry
- Sensitive headers (Authorization, Cookie, etc.) are automatically redacted in
display and export
- Rate limiting on request replay
- Retention limits on all stored data (notes, repeater, audit log)
- OFF by default — no interception until explicitly enabled by the user
Important: This tool is intended exclusively for authorized security testing.
Only use it on systems you have explicit permission to test.
Оценено 1 рецензентом на 5
Разрешения и данные
Требуемые разрешения:
- Получать доступ ко вкладкам браузера
- Получать доступ к вашим данных на всех сайтах
Сбор данных:
- Разработчик сообщает, что это расширение не требует сбора данных.
Больше сведений
- Ссылки дополнения
- Версия
- 0.2.1
- Размер
- 47,39 КБ
- Последнее обновление
- 16 дней назад (9 февр. 2026 г.)
- Связанные категории
- Лицензия
- Лицензия MIT
- История версий
- Добавить в подборку
documentation and security policy available on GitHub:
https://github.com/SolidLeoz/ff-android-interceptor