Overview
Deep packet inspection firewall for your browser — monitor, block, redirect, or modify any request. Your browser, your rules.
Take full control of your browser's network traffic. WireRules lets you inspect, block, redirect, and modify HTTP requests in real time with powerful, user-defined rules. Live Traffic Monitor See every network request your browser makes as it happens. Inspect URLs, request and response headers, body content, status codes, and errors — all from a clean, searchable interface. Flexible Rule Engine Create rules to control how your browser handles network requests: - Block unwanted requests by URL, domain, or resource type - Redirect requests to different URLs - Modify request and response headers (append, set, or remove) - Apply URL transforms (change scheme, host, port, path, or query parameters) - Upgrade HTTP connections to HTTPS - Filter by request method, domain, and resource type Default-Deny Mode Enable default-deny to block all requests except those explicitly allowed by your rules — ideal for locked-down browsing environments. Rule Templates Get started quickly with built-in rule templates for common use cases. Customize them to fit your needs. Persistent Configuration Your rules and settings are saved locally and survive browser restarts. Toggle individual rules on and off without deleting them. Use Cases - Debug web applications by inspecting and modifying network traffic - Block trackers, ads, or unwanted third-party requests - Test redirects and header modifications during development - Enforce HTTPS across all sites - Lock down browsing with default-deny and explicit allow rules
0 out of 5No ratings
Details
- Version0.0.2
- UpdatedMarch 16, 2026
- Size257KiB
- LanguagesEnglish (United States)
- DeveloperWebsite
Email
dev@wirerules.org - Non-traderThis developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.
Privacy
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes