Run different sessions side by side in Firefox, create any custom containers you want, route the right traffic through Burp and Highlight your traffic, and test faster without session collisions.
phoenix-box-demo.mp4
- Install PhoenixBox from Firefox Add-ons (AMO) or download
PhoenixBox.xpifrom Releases. - Open the PhoenixBox popup and start testing with the built-in Attacker, Victim, Admin, and Member containers.
- For Burp highlighting, also install
PhoenixBoxHighlighter.jarin Burp Suite and enable PhoenixBox Highlighter.
- Ready-to-go containers — Attacker, Victim, Admin, Member ship out of the box. Create as many custom ones as you need.
- Proxy routing (global + per-container) — send everything through Burp, or route only one role through a proxy while keeping the rest clean. Save custom presets and switch with one click.
- User-Agent spoofing — swap browser identity globally or per-container. Pick from a live top-100 list (desktop, mobile, all), paste a custom string, or save presets for quick switching.
- Burp Suite highlighting — the
X-MAC-Container-Colorheader lets the companion JAR color-code HTTP history by container so you instantly see which role fired each request. - Site assignments — lock a domain to a container and it always opens there. No more "wrong session" surprises.
- Full session isolation — cookies, storage, and cache stay walled off between containers. Zero bleed.
- Mozilla VPN integration — route specific containers through VPN while the rest go direct.
- Dark/light themes, accent colors, keyboard shortcuts — make it yours.
- Security-focused icons (skull, user-x, user-cog, user-minus) — display correctly in the PhoenixBox UI; Firefox's URL bar falls back to fingerprint since custom icons aren't part of the native
contextualIdentitiesAPI.
Works on any Firefox (release, ESR, Developer Edition, or Nightly).
Option A — Firefox Add-ons (recommended): Search for "PhoenixBox" on addons.mozilla.org and click Add to Firefox.
Option B — Manual install from GitHub Releases:
- Download
PhoenixBox.xpifrom GitHub Releases andPhoenixBoxHighlighter.jarfrom the PhoenixBox-Highlighter releases page. - Drag
PhoenixBox.xpiinto Firefox and confirm the installation prompt. - Pin the PhoenixBox toolbar icon if needed.
If you want Burp integration, also install PhoenixBoxHighlighter.jar in Burp Suite:
- Open Burp Suite.
- Go to Extender → Extensions → Add.
- Select Java as the extension type.
- Choose
PhoenixBoxHighlighter.jar. - Click Next and verify that “PhoenixBox” loads successfully.
git clone https://github.com/avihayf/PhoenixBox.git
cd PhoenixBox
npm install
npm run buildThen load the built extension:
- Open Firefox Developer Edition.
- Go to
about:debugging#/runtime/this-firefox. - Click Load Temporary Add-on.
- Select
dist/manifest.json.
- Click the PhoenixBox toolbar icon.
- Use the preconfigured containers or create your own.
- Open tabs in different containers to separate roles, sessions, and identities.
- Assign sites to containers so important targets always reopen in the right context.
- Optionally enable proxying, User-Agent overrides, Mozilla VPN, or Burp highlighting.
Popular workflows:
- Open a new tab in a specific container
- Always open a site in one container
- Route all traffic through Burp with the global proxy toggle
- Route only one role through a proxy with per-container settings
- Spoof User-Agent globally or per-container — pick from the top-100 list, paste a custom string, or load a saved preset
- Clear cookies/storage to reset a test flow
PhoenixBox can add an X-MAC-Container-Color header to requests so Burp can visually separate traffic by container role.
Basic setup:
- Download and install
PhoenixBoxHighlighter.jarfrom the PhoenixBox-Highlighter releases page into Burp Suite via Extender → Extensions → Add. - Configure Firefox to send traffic through Burp.
- Enable Add container color header in PhoenixBox.
- Browse in different containers and check Burp HTTP history.
The Burp companion extension strips the header before the request reaches the target server.
- Isolate every session so login state, cookies, and storage never bleed between targets or test accounts
- Test different privilege levels side by side with separate Attacker, Victim, Admin, and Member flows
- Replay the same workflow as different users without logging in and out all day
- Route specific roles through Burp or another proxy while keeping the rest of your browsing clean
- Spoof User-Agents on demand — flip to a mobile string for one container, keep desktop on another, or save presets so you switch in one click
- Track traffic visually in Burp so you instantly know which container, role, or scenario produced each request
No telemetry, no data collection. See PRIVACY.md for full details on data handling, proxy password storage, the container color header, and sync behavior.
- 🐛 Report Issues
- 💬 Discussions
- 📧 Contact: See GitHub profile
Mozilla Public License 2.0 - See LICENSE file for details.