PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.
If you are a chrome user you can check https://github.com/nccgroup/autochrome.
Connect to Burp with a simple click, this will probably remove the need for other addons like foxyProxy. However if you need the extra features provided by foxyProxy you can leave this unchecked.
PwnFox give you fast access to the Firefox containers. This allow you to have multiple identities in the same browser. When PwnFox and the Add container header
option are enabled, PwnFox will automatically add a X-PwnFox-Color
header to hightlight the query in Burp.
PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++.
PwnFox add a new message tab in you devtool. This allow you to quickly visualize all postMessage between frames.
You can also provide your own function to parse/filter the messages. You get access to 3 arguments:
You can return a string or a JSON serializable object.
Inject you own javascript code on page load. The code will be loaded as soon as possible. This can used to add dangerous behavior detection, or just to add extra function to your js console.
Be carefull, the injected toolbox will run in the window context. Do not inject secret in untrusted domain.
I will publish some of my toolbox soon (ENOTIME)
Sometime it’s easier to work with security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload.
Headers stripped:
You can find the latest build here:
about:addons
and choose install from file, then select PwnFox-$version.xpi
PwnFox-Burp.jar
as a java extension.cd firefox
web-ext build
# the zip file is available in /firefox/web-ext-artifacts/pwnfox-${version}.zip
# Optional. If you want to sign you own build
web-ext sign --api-key="$KEY" --api-secret="$SECRET"
# the xpi file is available in /firefox/web-ext-artifacts/pwnfox-${version}.xpi
Open and compile with Intellij IDEA
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…