PhoenixBox 제작자: 0xR3Db0Mb
PhoenixBox - multi-container extension for pentesting and bug bounty. Isolate sessions by role, route traffic through Burp Suite or custom proxies, spoof User-Agents, extract endpoints, and assign sites to containers.
사용자 4명사용자 4명
확장 메타 데이터
스크린샷
정보
PhoenixBox helps security professionals isolate penetration testing and bug bounty sessions using color-coded containers. Full session isolation, per-container proxy routing, optional Burp Suite request highlighting, User-Agent spoofing, and endpoint extraction — all in one extension.
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5. Save proxy presets and switch with one click.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
Endpoint extraction
Scan any page to extract API endpoints and URL paths from its HTML and inline scripts. Results are displayed in a dedicated view with search filtering, alphabetical or depth-based sorting, and one-click copy. Useful for quickly mapping an application's attack surface during reconnaissance.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Pick from a live top-100 list (desktop/mobile), paste a custom string, or save presets for quick switching. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Open source — MPL-2.0 | GitHub: https://github.com/avihayf/PhoenixBox
Session isolation
Run multiple browser identities side-by-side without session collisions. Each container has its own cookies, storage, and sessions. Assign sites to containers so targets always open in the right context.
Proxy and optional Burp integration
Route all traffic through a global proxy or set different proxies per container. Supports HTTP, HTTPS, SOCKS4, and SOCKS5. Save proxy presets and switch with one click.
Optionally enable "Paint the Burp" to color-tag requests in Burp Suite HTTP history by container. To use Burp highlighting, download PhoenixBoxHighlighter.jar from the GitHub (https://github.com/avihayf/PhoenixBox) release page and load it into Burp Suite Extensions.
The companion extension strips the color tag before forwarding requests to targets.
Endpoint extraction
Scan any page to extract API endpoints and URL paths from its HTML and inline scripts. Results are displayed in a dedicated view with search filtering, alphabetical or depth-based sorting, and one-click copy. Useful for quickly mapping an application's attack surface during reconnaissance.
User-Agent spoofing
Override the User-Agent globally or per container using real browser UA strings. Pick from a live top-100 list (desktop/mobile), paste a custom string, or save presets for quick switching. Useful for testing mobile paths, browser-specific logic, and fingerprint-based behavior.
Customizable UI
Dark/light themes and a fully adjustable accent color.
No telemetry. No data collection.
Open source — MPL-2.0 | GitHub: https://github.com/avihayf/PhoenixBox
1명이 5점으로 평가함
권한 및 데이터
필수 권한:
- 브라우저 탭에 접근
- 모든 웹사이트에서 사용자의 데이터에 접근
선택적 권한:
- Firefox 이외의 프로그램과 메시지 교환
- 북마크 읽기 및 수정
- 최근 브라우징 기록, 쿠키, 관련 데이터 삭제
- 브라우저 프록시 설정 제어
데이터 수집:
- 개발자가 이 확장 기능은 데이터 수집이 필요하지 않다고 합니다.
추가 정보
- 부가 기능 링크
- 버전
- 2.0.0
- 크기
- 11.78 MB
- 마지막 업데이트
- 2달 전 (2026년 3월 18일)
- 관련 카테고리
- 개인정보처리방침
- 이 부가 기능에 대한 개인정보처리방침 읽기
- 버전 목록
- 모음집에 추가