Browser-based HTTP Repeater for Security Researchers
Features β’ Installation β’ Usage β’ Screenshots β’ Support
ReVex is a powerful Firefox DevTools extension that brings Burp Suite Repeater-like functionality directly into your browser. Capture, modify, and replay HTTP requests without leaving your DevTools β perfect for penetration testers, bug bounty hunters, and security researchers.
- π‘ Request Capture β Automatically captures all HTTP requests from the current tab
- βοΈ Request Editor β Modify method, URL, headers, and body before resending
- π HTTP Repeater β Replay modified requests and analyze responses
- π Request History β Browse and select from captured requests
- π Copy as cURL β Generate valid bash cURL commands with proper escaping
- π Magic Decoder β Auto-detect and decode Base64, URL-encoded, JWT, and Hex strings
- π Deep Search β Real-time search with match highlighting and navigation
- π JSON Prettify β One-click formatting for JSON payloads
- ποΈ Response Preview β Render HTML responses in a safe iframe
- π¨ Cyberpunk Theme β Sleek dark interface with neon green accents
- π Tabbed Interface β Separate Request and Response views (Burp Suite style)
- β¨οΈ Keyboard Shortcuts β Ctrl+Enter to send requests
- π Toast Notifications β Visual feedback for actions
-
Clone or download this repository
git clone https://github.com/medjahdi/ReVex.git
-
Open Firefox and navigate to
about:debugging -
Click "This Firefox" in the sidebar
-
Click "Load Temporary Add-on..."
-
Select the
manifest.jsonfile from the ReVex folder -
Open DevTools (F12) and look for the ReVex tab!
- Open DevTools (F12) and click on the ReVex tab
- Browse the web β Requests are automatically captured in the History panel
- Click a request to load it into the editor
- Modify the method, URL, headers, or body as needed
- Click SEND (or press Ctrl+Enter) to replay the request
- Analyze the response in the Response tab
| Shortcut | Action |
|---|---|
Ctrl + Enter |
Send request |
Escape |
Close decode modal |
- Select text in the response body
- Click the β DECODE button
- ReVex auto-detects the encoding format:
- JWT β Decodes header and payload
- Base64 β Decodes to plain text
- URL Encoded β Decodes %XX sequences
- Hex β Converts hex to ASCII
Click the β cURL button to copy a valid bash command with:
- Proper single-quote escaping
- All headers included
- Request body (for POST/PUT)
ReVex requires the following permissions:
| Permission | Purpose |
|---|---|
webRequest |
Capture HTTP requests |
webRequestBlocking |
Intercept request details |
activeTab |
Access current tab's requests |
<all_urls> |
Send requests to any domain (for the Repeater) |
ReVex/
βββ manifest.json # Extension manifest (MV3)
βββ background.js # Request capture & relay service
βββ logo.png # Extension icon
βββ screenshot.png # Extension screenshot
βββ devtools/
β βββ devtools.html # DevTools page loader
β βββ devtools.js # Panel initialization
βββ panel/
β βββ panel.html # Main UI structure
β βββ panel.css # Cyberpunk styling
β βββ panel.js # UI logic & features
βββ .github/
βββ FUNDING.yml # Sponsor configuration
If ReVex helps with your security research, consider supporting development:
Contributions are welcome! Feel free to:
- π Report bugs
- π‘ Suggest features
- π§ Submit pull requests
This project is open source and available under the MIT License.
Built with β οΈ by @medjahdi

