PhoenixBox 作者: 0xR3Db0Mb
PhoenixBox - multi-container extension for pentesting and bug bounty. Isolate sessions by role, route traffic through Burp Suite or custom proxies, spoof User-Agents, extract endpoints, and assign sites to containers.
4 个用户4 个用户
扩展元数据
屏幕截图
关于此扩展
PhoenixBox helps security professionals isolate penetration testing and bug bounty sessions using color-coded containers. Full session isolation, per-container proxy routing, optional Burp Suite request highlighting, User-Agent spoofing, and endpoint extraction — all in one extension.
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5. Save proxy presets and switch with one click.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
Endpoint extraction
Scan any page to extract API endpoints and URL paths from its HTML and inline scripts. Results are displayed in a dedicated view with search filtering, alphabetical or depth-based sorting, and one-click copy. Useful for quickly mapping an application's attack surface during reconnaissance.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Pick from a live top-100 list (desktop/mobile), paste a custom string, or save presets for quick switching. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Open source — MPL-2.0 | GitHub: https://github.com/avihayf/PhoenixBox
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5. Save proxy presets and switch with one click.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
Endpoint extraction
Scan any page to extract API endpoints and URL paths from its HTML and inline scripts. Results are displayed in a dedicated view with search filtering, alphabetical or depth-based sorting, and one-click copy. Useful for quickly mapping an application's attack surface during reconnaissance.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Pick from a live top-100 list (desktop/mobile), paste a custom string, or save presets for quick switching. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Open source — MPL-2.0 | GitHub: https://github.com/avihayf/PhoenixBox
评分 5(1 位用户)
权限与数据
必要权限:
- 获取浏览器标签页
- 访问您在所有网站的数据
可选权限:
- 与 Firefox 之外的其他程序交换信息
- 读取和修改书签
- 清除最近的浏览历史、Cookie 及有关数据
- 控制浏览器的代理设置
收集的数据:
- 开发者称此扩展无需收集数据。
更多信息
- 版本
- 2.0.0
- 大小
- 11.78 MB
- 上次更新
- 2 个月前 (2026年3月18日)
- 隐私政策
- 阅读此附加组件的隐私政策
- 版本历史
- 添加到收藏集