- If Render Page crash:sudo sysctl -w kernel.unprivileged_userns_clone=1​- If embedded browser crash due sandbox:find .BurpSuite -name chrome-sandbox -exec chown root:root {} \; -exec chmod 4755 {} \;​- Scope with all subdomains:.*\.test\.com$​- Use Intruder to target specific parameters for scanning- Right click: actively scan defined insertion points​# Autorize Plugin1. Login with lower user, get the cookie or token and paste in header inside Configuration tab.2. In second browser, login with higher privilege user and start intercepting the requests of privilged functionality like admin-panel​# Configuration- Project Options -> HTTP -> Redirections -> Enable JavaScript-driven- User Options -> Misc -> Proxy Interception -> Always disabled- Target -> Site Map -> Show all && Show only in-scope items​# XSS Validator extension1) Start xss.js phantomjs $HOME/.BurpSuite/bapps/xss.js2) Send Request to Intruder3) Mark Position4) Import xss-payload-list from $Tools into xssValidator5) Change Payload Type to Extension Generated6) Change Payload Process to Invoke-Burp Extension - XSS Validator7) Add Grep-Match rule as per XSS Validator8) Start.​# Filter the noisehttps://gist.github.com/vsec7/d5518a432b70714bedad79e4963ff320​# Filter the noise TLDR# TLS Pass Through.*\.google\.com.*\.gstatic\.com.*\.googleapis\.com.*\.pki\.goog.*\.mozilla\.com​# Send swagger to burphttps://github.com/RhinoSecurityLabs/Swagger-EZ# Hosted:https://rhinosecuritylabs.github.io/Swagger-EZ/​# If some request/response breaks or slow down Burp- Project options -> HTTP -> Streaming responses -> Add url and uncheck "Store streaming responses...."​# Burp Extension rotate IP yo avoid IP restrictionshttps://github.com/RhinoSecurityLabs/IPRotate_Burp_Extension​# Collab alternativehttp://dnsbin.zhack.ca/http://requestbin.net/http://rbnd.gl0.eu/https://requestcatcher.com/https://canarytokens.org/https://webhook.site​# Run private collaborator instance in AWShttps://github.com/Leoid/AWSBurpCollaborator​# Run your own collab serverhttps://github.com/yeswehack/pwn-machine​# Wordlist from burp project filecat project.burp | strings | tok | sort -u > custom_wordlist.txt​# Autorize:1. Copy cookies from low priv user and paste in Autorize2. Set filters (scope, regex)3. Set Autorize ON4. Navigate as high priv user# Autorize:1. Copy cookies from low priv user and paste in Autorize2. Set filters (scope, regex)3. Set Autorize ON4. Navigate as high priv user# Turbo Intruderbasic.py -> Set %s in the injection point and specify wordlist in scriptmultipleParameters.py -> Set %s in all the injection points and specify the wordlists in script​
​Burp Bounty Pro: Active and passive checks customizable based on patterns.
​Active Scan ++ More active and passive scans.
​Software Vulnerability Scanner Passive scan to detect vulnerable software versions
​Param Miner Passive scan to detect hidden or unlinked parameters, cache poisoning
​Backslash Powered Scanner Active scan for SSTI detection
​CSRF Scanner Passive CSRF detection
​Freddy Active and Passive scan for Java and .NET deserialization
​JSON Web Tokens decode and manipulate JSON web tokens
​Reissue Request Scripter generates scripts for Python, Ruby, Perl, PHP and PowerShell
​Burp-exporter other extension for export request to multiple languages
​Retire.js Passive scan to find vulnerable JavaScript libraries
​Web Cache Deception Scanner Active scan for Web Cache Deception vulnerability
​Cookie decrypter Passive check for decrypt/decode Netscaler, F5 BigIP, and Flask cookies
​Reflector Passive scan to find reflected XSS
​J2EEScan Active checks to discover different kind of J2EE vulnerabilities
​HTTP Request Smuggler Active scanner and launcher for HTTP Request Smuggling attacks
​Flow History of all burp tools, extensions and tests
​Taborator Allows Burp Collaborator in a new tab
​Turbo Intruder Useful for sending large numbers of HTTP requests (Race cond, fuzz, user enum)
​Auto Repeater Automatically repeats requests with replacement rules and response diffing
​Upload Scanner Tests multiple upload vulnerabilities
​poi Slinger: Active scan check to find PHP object injection
​Java Deserialization Scanner Active and passive scanner to find Java deserialization vulnerabilities
​Autorize Used to detect IDORs
​.NET Beautifier Easy view for VIEWSTATE parameter
​Wsdler generates SOAP requests from WSDL request
​Collaborator Everywhere Inject headers to reveal backend systems by causing pingbacks
​Collabfiltrator Exfiltrate blind remote code execution output over DNS
​Bypass WAF Add some headers to bypass some WAFs
​SAMLRaider for testing SAML infrastructures, messages and certificates
​GoldenNuggets-1 create wordlists from target
​Logger++ Log for every burp tool and allows highlight, filter, grep, export...
​OpenAPI Parser Parse and fetch OpenAPI documents directly from a URL
​CO2: Multiple functions such sqlmapper, cewler
​XSSValidator: XSS intruder payload generator and checker
​Shelling: command injection payload generator
​burp-send-to: Adds a customizable "Send to..."-context-menu.
​ssrf-king: Automates SSRF detection