It downloads the most important extensions, and install it on your browser. The used extensions has been chosen by a survey among the information security community. Based on it's results, Firefox Security Toolkit was made. Also, it allows you to download Burp Suite certificate and a large user-agent list for User-Agent Switcher. Making it one-click away to prepare your web-application testing browser.
OWASP Mantra and Hcon STF are not regularly updated, and needs a lot of work in order to develop and maintain. Meanwhile, Firefox Security Toolkit does not need a additional maintaining, although I would be maintaining it for any issues/bugs if needed. The used extensions are downloaded from Mozilla Addons Store with its latest version, to ensure the best testing experience for the penetration tester.
Web-Application Penetration Testers, Information Security Learners, and basically anyone interested in web-application security.
The project supports Linux/Unix environments.
bash ./firefox_security_toolkit.sh
- iMacros for Firefox (https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox/)
- User-Agent Switcher and Manager (https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher/)
- HackBar Quantum (https://addons.mozilla.org/en-US/firefox/addon/hackbar-quantum/)
- HackBar V2 (https://addons.mozilla.org/en-US/firefox/addon/hackbar-free/)
- HackTools (https://addons.mozilla.org/en-US/firefox/addon/hacktools/)
- HTTP Header Live (https://addons.mozilla.org/en-US/firefox/addon/http-header-live/)
- show-my-ip (https://addons.mozilla.org/en-US/firefox/addon/show-ip/)
- FoxyProxy Standard (https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/)
- Wappalyzer (https://addons.mozilla.org/en-US/firefox/addon/wappalyzer/)
- Web Developer (https://addons.mozilla.org/en-US/firefox/addon/web-developer/)
- Flagfox (https://addons.mozilla.org/en-US/firefox/addon/flagfox/)
- Resurrect Pages (https://addons.mozilla.org/en-US/firefox/addon/resurrect-pages/)
- JSONView (https://addons.mozilla.org/en-US/firefox/addon/jsonview/)
- Flagfox (https://addons.mozilla.org/en-US/firefox/addon/flagfox/)
- FoxyProxy Standard (https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/)
- Google Dork Builder (https://addons.mozilla.org/en-US/firefox/addon/google-dork-builder/)
- Disable WebRTC (https://addons.mozilla.org/en-US/firefox/addon/happy-bonobo-disable-webrtc/)
- Google Dork Builder (https://addons.mozilla.org/en-US/firefox/addon/google-dork-builder/)
- Disable WebRTC (https://addons.mozilla.org/en-US/firefox/addon/happy-bonobo-disable-webrtc/)
- Copy PlainText (https://addons.mozilla.org/en-US/firefox/addon/copy-plaintext/)
- Easy XSS (https://addons.mozilla.org/en-US/firefox/addon/easy-xss/)
- CSRF spotter (https://addons.mozilla.org/en-US/firefox/addon/csrf-spotter/)
- KNOXSS Community Edition (https://addons.mozilla.org/en-US/firefox/addon/knoxss-community-edition/)
- XML Viewer Plus (https://addons.mozilla.org/en-US/firefox/addon/xml-viewer/)
- Shodan.io (https://addons.mozilla.org/en-US/firefox/addon/shodan_io/)
- Downloading Burp Suite certificate.
- Downloading a large user-agent list for User-Agent Switcher.
This project is made for educational and ethical testing purposes only. Usage of Firefox Security Toolkit for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
The project is licensed under MIT License.
Mazin Ahmed
- Website: https://mazinahmed.net
- Email: mazin AT mazinahmed DOT net
- Twitter: https://twitter.com/mazen160
- Linkedin: http://linkedin.com/in/infosecmazinahmed