Firefox Browser Add-ons
  • Extensions
  • Themes
    • for Firefox
    • Dictionaries & Language Packs
    • Other Browser Sites
    • Add-ons for Android
Log in
Preview of PhoenixBox

PhoenixBox by 0xR3Db0Mb

PhoenixBox - multi-container extension for pentesting and bug bounty. Isolate sessions by role, route traffic through Burp Suite or custom proxies, spoof User-Agents, extract endpoints, and assign sites to containers.

5 (1 review)5 (1 review)
Download Firefox and get the extension
Download file

Extension Metadata

Screenshots
Your color. Your context.
Dark & Light mode ready.Create. Isolate. Test.Test against the top 100 real-world user agents.Highlight requests in Burp Suite for clearer, faster analysis.Extract endpoints in one click and instantly analyze them in a clean, focused view.
About this extension
PhoenixBox helps security professionals isolate penetration testing and bug bounty sessions using color-coded containers. Full session isolation, per-container proxy routing, optional Burp Suite request highlighting, User-Agent spoofing, and endpoint extraction — all in one extension.

Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.

Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5. Save proxy presets and switch with one click.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.

Endpoint extraction
Scan any page to extract API endpoints and URL paths from its HTML and inline scripts. Results are displayed in a dedicated view with search filtering, alphabetical or depth-based sorting, and one-click copy. Useful for quickly mapping an application's attack surface during reconnaissance.

User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Pick from a live top-100 list (desktop/mobile), paste a custom string, or save presets for quick switching. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.

Customizable UI
Dark/light themes and a fully adjustable accent color.

No telemetry. No data collection.

Open source — MPL-2.0 | GitHub: https://github.com/avihayf/PhoenixBox
Rated 5 by 1 reviewer
Log in to rate this extension
There are no ratings yet

Star rating saved

5
1
4
0
3
0
2
0
1
0
Read 1 review
Permissions and data

Required permissions:

  • Access browser tabs
  • Access your data for all websites

Optional permissions:

  • Exchange messages with programs other than Firefox
  • Read and modify bookmarks
  • Clear recent browsing history, cookies, and related data
  • Control browser proxy settings

Data collection:

  • The developer says this extension doesn't require data collection.
Learn more
More information
Add-on Links
  • Homepage
  • Support site
Version
2.0.0
Size
11.78 MB
Last updated
6 days ago (Mar 18, 2026)
Related Categories
  • Web Development
  • Privacy & Security
  • Tabs
License
Mozilla Public License 2.0
Privacy Policy
Read the privacy policy for this add-on
Version History
  • See all versions
Add to collection
Report this add-on
Go to Mozilla's homepage

Add-ons

  • About
  • Firefox Add-ons Blog
  • Extension Workshop
  • Developer Hub
  • Developer Policies
  • Community Blog
  • Forum
  • Report a bug
  • Review Guide

Browsers

  • Desktop
  • Mobile
  • Enterprise

Products

  • Browsers
  • VPN
  • Relay
  • Monitor
  • Pocket
  • Bluesky (@firefox.com)
  • Instagram (Firefox)
  • YouTube (firefoxchannel)
  • Privacy
  • Cookies
  • Legal

Except where otherwise noted, content on this site is licensed under the Creative Commons Attribution Share-Alike License v3.0 or any later version.