PhoenixBox Autor: 0xR3Db0Mb
PhoenixBox helps security professionals isolate pentesting sessions using color-coded containers. Full session isolation, per-container proxy routing, Burp Suite request highlighting, and User-Agent spoofing.
Metadáta rozšírenia
Snímky obrazovky
O tomto rozšírení
PhoenixBox helps security professionals isolate penetration testing sessions using color-coded containers. Full session isolation, per-container proxy routing, optional Burp Suite request highlighting, and User-Agent spoofing — all in one extension.
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Hodnotené 5 od 1 recenzenta
Povolenia a údaje
Požadované oprávnenia:
- Pristupovať ku kartám prehliadača
- Pristupovať k údajom pre všetky webové stránky
Voliteľné povolenia:
- Vymieňať si správy s inými programami ako Firefox
- Čítať a upravovať záložky
- Čítať nedávnu históriu prehliadania, cookies a súvisiace údaje
- Kontrola nad nastavením proxy
Zber údajov:
- Vývojár uvádza, že toto rozšírenie nevyžaduje zhromažďovanie údajov.
Ďalšie informácie
- Odkazy doplnku
- Verzia
- 1.2.0
- Veľkosť
- 13,62 MB
- Posledná aktualizácia
- pred 5 dňami (12. mar 2026)
- Príbuzné kategórie
- Licencia
- Mozilla Public License 2.0
- Zásady ochrany osobných údajov
- Prečítajte si Zásady ochrany osobných údajov pre tento doplnok
- História verzií
- Pridať do kolekcie