CDP-based runtime instrumentation for the browser

Frida-style JavaScript instrumentation, directly inside the browser.

Wirebrowser lets you hook functions at runtime, script the debugger, trace object origins with Origin Trace, inspect live runtime objects, and move from network traffic → runtime state → code inside one CDP-powered workflow.

Built directly on Chrome DevTools Protocol (CDP). No monkeypatching. No source rewriting. No browser extension model.

Core Capabilities

Wirebrowser is built for runtime instrumentation and reverse engineering in the browser: hooks, programmable debugging, origin tracing, and live memory inspection — all on top of CDP.

1 — Live Hooks

Hook functions at runtime

Intercept calls, inspect arguments, inject logic, and override return values without monkeypatching or modifying source files.

2 — Programmable Debugger

Script execution flow

Drive stepping programmatically with primitives such as stepInto, stepOver, stepOut, and async-aware stepping to reach the execution point that matters.

3 — Origin Trace

Find where values come from

Start from a runtime value or object and trace back to the user-land code where it first appears, using Breakpoint-Driven Heap Search.

4 — Live Object Search

Inspect and patch live objects

Search real runtime objects by value, structure, or prototype and work with actual references — not serialized copies or frozen snapshots.

Extended with network interception, replay, automation, and API collections.

Origin Trace (BDHS)

Traditional debugging starts from code: you guess where to place breakpoints, rerun execution, and hope you stop in the right place.

Origin Trace, built on top of Breakpoint-Driven Heap Search (BDHS), reverses that workflow: you start from a value or object already observed at runtime, and Wirebrowser traces back to the user-land code where it first appears.

→ Learn more in the documentation

With Origin Trace, you can:

▶ start from a runtime value or object

▶ locate the function where it first appears

▶ narrow execution down to the relevant user-land code path

It answers the practical reverse-engineering question: where did this come from?

Live Object Search

Heap snapshots let you observe objects after the fact. Live Object Search lets you work with them while the program is running.

Instead of searching frozen snapshot data, Wirebrowser searches live runtime memory and gives you access to actual object references that you can inspect, correlate, and patch during execution.

→ Learn more in the documentation

This means you can:

▶ search objects by key, value, prototype, or similarity

▶ inspect them while they are still active

▶ patch them directly in runtime memory

This is something snapshots alone cannot provide.

Powered by Structural Similarity

Origin Trace and Live Object Search do not rely only on exact matches. Wirebrowser can identify structurally similar objects across runtime memory and execution steps, making it possible to follow evolving data through real program execution.

See Wirebrowser in action

Origin Trace, live object search, and runtime instrumentation inside a real browser workflow.

Network-to-Runtime Workflow

Wirebrowser also connects intercepted traffic to runtime analysis, so you can move from HTTP data to live objects and then to the code path that produced them.

Network Interception

Intercept, modify, and replay HTTP requests and responses directly inside the runtime analysis workflow.

▶ inspect and rewrite requests and responses in real time

▶ replay captured traffic with modified parameters

▶ correlate network data with live objects in memory

This makes it possible to move from network data → runtime state → code origin without switching tools.

API Collections

API Collections let you organize, edit, and replay HTTP requests in multiple formats.
Inside Wirebrowser, they are:

▶ built from intercepted traffic

▶ reusable across debugging sessions

▶ directly connected to automation and runtime inspection

They extend the instrumentation workflow instead of acting as a standalone API client.

Built for Browser Reverse Engineering

Wirebrowser is designed for advanced debugging, reverse engineering, security research, and runtime experimentation in modern web applications.

If Chrome DevTools gives you manual control, Wirebrowser gives you scriptable control: hooks, programmable stepping, origin tracing, live object inspection, and network-to-runtime workflows built directly on CDP.