
FormVisualizer 作者: tterac
實驗中實驗中
A small Firefox extension for web app security testers. It allows visualizing and manipulating form elements and clearing cookies, local storage and cache with a single action.
必須使用 Firefox 才能使用此擴充套件
擴充套件後設資料
畫面擷圖




關於此擴充套件
Warning: It is not recommended that you use this extension with your Firefox profile for daily business use. Instead, use this with a profile for testing purpose. This is because you may clear all cookies and local storage data by accident (see feature 2).
You can find source code and license conditions on GitHub.
This extension is designed to make web application security testers' job a little easier. As a pentester, you may sometimes feel annoyed going back and forth between browser and local proxy such as Burp. With this extension, you can do simple request parameter manipulation only inside your browser.
This extension provides following four features:
1. Form visualization and manipulation
You can visualize all form elements (form, input, select, textarea including hidden ones) and others (applet, embed, iframe) in a web page with a single action [Alt+Ctrl+F]. You can easily edit their attributes such as name, value, action, src, method, enctype, target and disabled. The screen shots show how this feature looks like. This extension provides context menu to see and manipulate link URLs as well.
2. Clearing cookie, local storage and cache
You can clear all cookies and local storage data with a single action [Alt+Ctrl+D].
Additionally, browsing cache can be cleared from menu button.
Be aware that no confirmation screen is show upon deletion.
3. Show DOM HTML source.
This shows DOM HTML source (i.e. document.documentElement.outerHTML) with a single action [Alt+Ctrl+S]. The source is syntax highlighted.
4. Track HTTP response status code and URLs.
This shows HTTP status code in the top right corner of the browser tab.
Only HTTP status code of top-level navigation is shown.
From v1.3.2, URLs fetched by the page (top-level navigation, iframe, XHR, websocket etc.) are shown in developer tool console.
You can find source code and license conditions on GitHub.
This extension is designed to make web application security testers' job a little easier. As a pentester, you may sometimes feel annoyed going back and forth between browser and local proxy such as Burp. With this extension, you can do simple request parameter manipulation only inside your browser.
This extension provides following four features:
1. Form visualization and manipulation
You can visualize all form elements (form, input, select, textarea including hidden ones) and others (applet, embed, iframe) in a web page with a single action [Alt+Ctrl+F]. You can easily edit their attributes such as name, value, action, src, method, enctype, target and disabled. The screen shots show how this feature looks like. This extension provides context menu to see and manipulate link URLs as well.
2. Clearing cookie, local storage and cache
You can clear all cookies and local storage data with a single action [Alt+Ctrl+D].
Additionally, browsing cache can be cleared from menu button.
Be aware that no confirmation screen is show upon deletion.
3. Show DOM HTML source.
This shows DOM HTML source (i.e. document.documentElement.outerHTML) with a single action [Alt+Ctrl+S]. The source is syntax highlighted.
4. Track HTTP response status code and URLs.
This shows HTTP status code in the top right corner of the browser tab.
Only HTTP status code of top-level navigation is shown.
From v1.3.2, URLs fetched by the page (top-level navigation, iframe, XHR, websocket etc.) are shown in developer tool console.
為您的體驗打分數
權限與資料了解更多
必要權限:
- 清除最近的瀏覽紀錄、Cookie 等相關資料
- 存取您所有網站中的資料
更多資訊
新增至收藏集
tterac 製作的更多擴充套件
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分