If this project helps your work, support ongoing maintenance and new features.
ETH Donation Wallet
0x11282eE5726B3370c8B480e321b3B2aA13686582
Scan the QR code or copy the wallet address above.
Professional-grade Burp Suite extension for comprehensive API reconnaissance, intelligent fuzzing, and AI-powered security testing.
BurpAPISecuritySuite consolidates functionality that would typically require 10+ separate extensions into a single, optimized extension. This architectural decision provides significant performance benefits:
Memory Efficiency: Running multiple Burp extensions simultaneously creates substantial memory pressure. Each extension maintains its own state, UI components, and event listeners. A single extension with multiple tabs shares resources efficiently and reduces overall memory footprint.
Reduced API Overhead: Burp's extension API processes callbacks from every loaded extension. With 10+ extensions, each HTTP request triggers callbacks across all extensions, creating multiplicative overhead. One extension means one callback chain, dramatically reducing CPU cycles and improving responsiveness.
Shared Context: Integrated tabs share captured traffic data, eliminating redundant processing. The Recon tab captures once, and all other tabs (Fuzzer, Auth Replay, Passive Discovery, etc.) operate on the same dataset without re-parsing requests.
Faster Startup: Loading one extension is significantly faster than loading 10+ extensions. Burp initializes UI components, registers callbacks, and allocates resources once instead of repeatedly.
Better Stability: Fewer extensions mean fewer potential conflicts, version mismatches, and compatibility issues. A single codebase is easier to test, debug, and maintain.
This design philosophy prioritizes performance and user experience while delivering comprehensive API security testing capabilities that would otherwise require a complex multi-extension setup.
- BurpAPISecuritySuite
- Table of Contents
- Why One Extension with Multiple Tabs?
- Screenshots
- Purpose
- Key Features
- Comparison with Similar Tools
- Installation
- Requirements
- Usage
- Basic Workflow
- Tab Overview
- 1. Recon Tab
- Logger Tab
- 2. Diff Tab
- 3. Version Scanner Tab
- 4. Param Miner Tab
- 5. Fuzzer Tab
- 6. Auth Replay Tab
- 7. Passive Discovery Tab
- Sensitive Data Tab
- 8. ApiHunter Tab
- 9. Nuclei Tab
- 10. HTTPX Tab
- 11. Katana Tab
- 12. FFUF Tab
- 13. Kiterunner Tab
- 14. Wayback Tab
- 15. SQLMap Verify Tab
- 16. Dalfox Verify Tab
- 17. API Assets Tab
- 18. OpenAPI Drift Tab
- 19. GraphQL Tab
- Advanced Fuzzing Capabilities
- Data & Export
- Integration
- Workflow Examples
- Technical Information
- Use Cases
- Documentation
- FAQ
- 💼 Professional Services
- Contributing
- Changelog
- Updates
Integrated gap-fill + deep-search runner calibrated to complement Nuclei/HTTPX/Katana coverage.
Note: ApiHunter is a proprietary tool. See https://github.com/Teycir/ApiHunter for details.
BurpAPISecuritySuite is a complete API security testing toolkit that:
- Captures & analyzes API traffic with smart normalization
- Generates intelligent fuzzing campaigns with 100+ attack vectors
- Exports to multiple formats for AI, Turbo Intruder, and Nuclei
- Auto-configures Burp Intruder with attack positions
- Detects vulnerabilities across OWASP API Top 10
- Auto-Capture: Monitors all HTTP/Proxy traffic automatically
- Smart Normalization: Groups similar endpoints (
/users/123→/users/{id}) - Comprehensive Extraction: Parameters, headers, auth methods, request/response bodies
- Pattern Detection: REST, GraphQL, SOAP, JSON/XML APIs
- Security Analysis: IDOR/BOLA, unauth endpoints, PII exposure, weak encryption
- JWT Detection: Automatic JWT extraction and security analysis
- Diff Comparison: Compare two API exports to detect changes
- Import/Export: Save and restore captured API data
- 15 Attack Types: BOLA, IDOR, SQLi, XSS, NoSQLi, SSTI, JWT, GraphQL, Race Conditions, Business Logic, WAF Bypass, and more
- Smart Detection: Context-aware vulnerability identification
- 108+ Attack Vectors: Comprehensive payload library with bypass techniques
- Severity Ratings: Critical/High/Medium/Low risk classification
- WAF Evasion: Header injection, encoding bypass, method override, path manipulation
- ApiHunter Deep Search: Filtered/deduped endpoint scans with WAF-evasive gap-fill calibration for auth/workflow/API-logic issues (proprietary tool: https://github.com/Teycir/ApiHunter)
- Version Scanner: Test API version variations (v1, v2, dev, staging, legacy)
- Param Miner: Discover hidden parameters (admin, debug, internal, callback)
- SQLMap Verify: Confirm SQL injection candidates with evidence-driven sqlmap checks
- Dalfox Verify: Confirm reflected XSS candidates with Dalfox proof output
- API Asset Discovery: Expand first-party scope with
subfinder+dnsx+httpx - OpenAPI Drift: Compare observed traffic vs OpenAPI spec for undocumented/missing endpoints
- Counterfactual Differentials: Scoreless, non-destructive invariant breaks for representation/auth/identifier drift
- Sequence Invariants: Non-destructive deep-logic checks with confidence/evidence ledger export
- Token Lineage Analysis: Passive token/session lifecycle drift detection for logout/revoke/refresh rotation gaps
- Cross-Interface Parity & Drift: Detects REST/GraphQL/internal auth parity gaps, cache/auth drift, time-window flips, content-type policy drift, and replay-after-delete leakage
- Wayback Machine: Discover historical endpoints and forgotten APIs
- Katana Crawler: Deep web crawling with automatic endpoint discovery
- HTTPX Probe: Fast HTTP probing with technology detection
- FFUF Fuzzer: Directory and file fuzzing with wordlist support
- Burp Intruder: Auto-configured attack positions (§markers§)
- AI Context: Structured data for ChatGPT/Claude payload generation
- Turbo Intruder: Ready-to-use Python scripts for race conditions & high-speed attacks
- Nuclei: Target export and integrated scanning with WAF evasion
- Payload Library: JSON export of all attack payloads
- cURL Export: Copy attacks as cURL commands for manual testing
| Feature | BurpAPISecuritySuite | Burp Scanner Pro | OWASP ZAP | Postman |
|---|---|---|---|---|
| Price | Free | $449/year | Free | Free/Paid |
| API-Specific Focus | ✅ Yes | ✅ Yes | ||
| Auto-Capture & Normalization | ✅ Yes | ❌ No | ❌ No | |
| BOLA/IDOR Detection | ✅ Automated | ❌ No | ||
| Attack Types | 15 types | 100+ (generic) | 50+ (generic) | Limited |
| API Payloads | 108+ API-focused | Generic web | Generic web | Basic |
| JWT Analysis | ✅ Automatic | |||
| GraphQL Testing | ✅ Built-in | ❌ No | ||
| Race Condition Testing | ✅ Turbo Intruder | ✅ Turbo Intruder | ❌ No | ❌ No |
| AI Integration | ✅ Export AI Bundle + LLM payloads | ❌ No | ❌ No | ❌ No |
| Version Scanner | ✅ Built-in | ❌ No | ❌ No | ❌ No |
| Parameter Mining | ✅ Built-in | ❌ No | ❌ No | |
| Wayback Discovery | ✅ Built-in | ❌ No | ❌ No | ❌ No |
| External Tool Integration | ✅ ApiHunter, Nuclei, SQLMap, Dalfox, HTTPX, Katana, FFUF, Subfinder, DNSX | ❌ No | ||
| WAF Bypass Techniques | ✅ 20+ methods | ❌ No | ||
| Export Formats | JSON, Intruder, Turbo, Nuclei, cURL | XML, HTML | XML, HTML, JSON | JSON, cURL |
| Burp Community Support | ✅ Yes | ❌ Pro only | N/A | N/A |
| Learning Curve | Low | Medium | Medium | Low |
| Best For | API pentesting, bug bounty | Full web app testing | DAST automation | API development |
- API-First Design: Built specifically for modern API security testing (REST, GraphQL, SOAP)
- Free & Open Source: All features available without licensing costs
- Intelligent Automation: Auto-detects BOLA/IDOR vulnerabilities across all authenticated endpoints
- AI-Powered: Export all-tab AI bundles (plus sequence evidence ledger) for ChatGPT/Claude triage
- Differential-First Logic Coverage: Includes scoreless counterfactual drift checks that many signature scanners miss
- Token Lifecycle Drift Coverage: Adds passive token-lineage analysis for logout/refresh/session-rotation gaps many scanners ignore
- Comprehensive Coverage: 15 attack types with 108+ API-specific payloads
- External Tool Integration: Seamlessly integrates with ApiHunter, Nuclei, SQLMap, Dalfox, HTTPX, Katana, FFUF, Subfinder, and DNSX
- Works with Burp Community: No need for expensive Burp Pro license
- Active Development: Regular updates with new attack vectors and features
- Burp → Extender → Extensions → Add → Python
- Select:
BurpAPISecuritySuite.py - Extension loads and starts capturing automatically
- Burp Suite (Professional or Community Edition)
- Jython Standalone JAR (https://www.jython.org/download)
- Capture: Browse/scan target API with auto-capture enabled
- Review: Check the
Recontab to inspect captured endpoints and findings - Deep Logic (Optional): In
Passive Discovery, clickRun Differentialfor scoreless counterfactual checks, orRun Invariantsfor the full deep-logic stack - Refresh Cache (Optional): In
Recon, clickRefresh Invariantsto refresh Differential + Sequence + Golden + State Matrix + Token Lineage + Parity Drift results before export - Export: In
Recon, clickExport AI Bundleto generate all-tab AI context - Generate: Feed exported JSON to an LLM (ChatGPT, Claude, etc.) for triage/payload planning
- Auto-Capture Toggle: Enable/disable automatic traffic capture
- Sample Limit: Configure samples per endpoint (1, 3, 5, 10)
- Pagination: Navigate large endpoint lists (50, 100, 200, 500 per page)
- Search & Filters: Filter by host, method, severity, search term
- Filter Noise: Starts selected on launch to suppress tracker/static/CDN noise and keep downstream tool tabs focused on higher-signal API traffic
- Grouping: Group endpoints by Host, Method, Auth, Encryption
- Export All: Export complete API analysis to JSON
- Export Host: Export specific host endpoints
- Export AI Bundle: Export all-tab AI-ready context + LLM request payloads
- Import: Load Suite exports, Excalibur HAR/session sidecars, or
excalibur-burp-bridge/v1bundles (Excalibur is a proprietary tool: https://github.com/Teycir/Excalibur) - Postman: Export scoped endpoints to Postman Collection v2.1
- Insomnia: Export scoped endpoints to Insomnia import JSON
- Tool Health: One-click diagnostics for ApiHunter/Nuclei/HTTPX/Katana/FFUF/Wayback/SQLMap/Dalfox/Subfinder/DNSX binary compatibility
- Button Help: Quick guide for Recon buttons and expected outputs
- Refresh Invariants: Refresh Differential + Sequence + Golden + State Matrix + Token Lineage + Parity Drift analysis from captured endpoints before AI export
- Invariant Status Line: Shows Differential, Sequence, Golden, State Matrix, Token Lineage, and Parity Drift cache counts with source/update time
- Clear Data: Reset captured Recon endpoints and Logger events together
- Timeline View: High-signal request timeline (
tool,method,host/path,status,len,type,tags). - Two-Line Toolbar: Controls are split across two rows to avoid hidden/clipped actions.
- Noise Filter: Shared noise suppression aligned with Recon filtering heuristics.
- Auto Prune: Trims oldest Logger rows when
Max Memoryis exceeded (default20,000rows). - Logging Off: Single capture toggle for Logger ingestion (
on/offmodel). - Clear Data: Shared clear action that resets both Logger events and Recon captured data.
- ReqM / RespM: Useful marker counts by default, and regex hit counts when regex is active.
- Grep + Rules:
Grep Values...,Tag Rules..., and saved regex workflow (Save Regex+ saved filters). - Header Sorting: Click a header to sort, Shift+click to add a second sort key.
- Right-Click Ops:
Show Endpoint Detail,Send Selected To Repeater,Copy Selected Rows, and bulk selection.
- Load Export 1/2: Load two API exports for comparison
- Compare: Identify added, removed, and unchanged endpoints
- Copy: Copy diff results to clipboard
- Version Input: Comma-separated version strings to test
- Presets: Standard, Decimal, Environments, Legacy, All
- Scan Versions: Test all API endpoints with version variations
- Export Results: Save discovered versions to file
- Param Input: Comma-separated parameter names to test
- Presets: Admin, Debug, Access, Callback, All
- Mine Params: Discover hidden parameters in API endpoints
- Export Results: Save parameter mining results
- Attack Type Dropdown: All, BOLA, IDOR, Auth Bypass, SQLi, XSS, SSRF, XXE, WAF Bypass
- Generate: Create fuzzing campaign with intelligent attack detection
- Send to Intruder: Export to Burp Intruder with pre-configured positions
- Export Payloads: Save all payloads to JSON
- Turbo Intruder: Generate Python scripts for high-speed attacks
- Copy as cURL: Export attack as cURL command
- Scope: Replay Selected Endpoint, Filtered View, or All Endpoints
- Max: Limit endpoints per run for faster triage
- Guest/User/Admin Headers: Set profile headers in
Name: valueformat - Distinct Context Guard: If two role headers are identical, replay collapses duplicates and asks for at least two distinct contexts
- Extract: Open searchable popup to pick captured auth/session headers
- Base URLs (Exclusive): Optional comma/newline list of first-party base URLs/hosts to replay exclusively (includes derivatives like subdomains on the same base domain)
- URL Copy UX: Select one or more replay rows, then use
Copy URL(s)(or right-clickCopy Selected URL(s)) to copy full URLs - Severity Ranking: Click
Resultheader to rank by severity, or useSort Severityfor quickCRITICAL -> HIGH -> MEDIUM -> OK - Run Replay: Replay requests per profile and compare response behavior
- Stop: Cancel active replay safely
- Findings Output: Severity-scored evidence for likely BOLA/authz drift
- Passive Only: Analyzes captured/replayed proxy traffic without active requests
- Mode Selector: Run
Allor per-category checks (API3,API4,API5,API6,API9,API10) - Scope Selector: Analyze
All Endpoints,Filtered View, or current host scope - Run Differential: Run scoreless counterfactual checks for representation/auth/identifier precedence drift (passive-only)
- Run Token Lineage: Run passive token/session family checks for logout/revoke/refresh invalidation drift
- Run Parity Drift: Run cross-interface parity checks plus cache/auth, time-window, content-type, and replay-after-delete drift heuristics
- Run Invariants: Run full non-destructive stack (Differential + Sequence + Golden + State + Token Lineage + Parity Drift) for deep workflow/token/state analysis
- Run All Advanced: One-click execution of all advanced deep-logic engines
- Abuse Chains: Build shortest graph-to-replay exploit chains (
auth -> object access -> state change) - Proof Mode: Generate minimal reproducible packet sets with expected vulnerable vs safe signals
- Spec Guardrails: Derive enforceable auth/param/transition rules from observed behavior and flag violations
- Role Delta: Compare role-level behavior (guest/user/admin-like) and rank suspicious parity for BOLA/BFLA triage
- Run / Stop / Clear: Execute discovery, cancel safely, and reset output quickly
- Export / Copy: Save findings or copy report text
- Export Ledger: Save Differential + Sequence + Golden + State Matrix + Token Lineage artifacts as JSON files
- Advanced Exports: Also writes
abuse_chain_*,proof_mode_packet_sets,spec_guardrails_*, androle_delta_*JSON artifacts - Output: Severity/categorical summary plus top findings for triage
- Goal: Regex-first extraction of API-sensitive material from captured proxy traffic and imported HAR/replay data already loaded into Recon.
- Scope: Scan
Selected Endpoint,Filtered View, orAll Endpoints. - Source Mode: Restrict to
Proxy/Live Capture,Imported HAR/Replay, or scan both together. - Pattern Packs:
All API Sensitive,Secrets & Tokens,PII & Financial,Credentials & Session,Infra/Internal Exposure. - Max Findings: Hard cap to keep output actionable during large captures.
- Run Scan: Produces grouped findings with severity/category, endpoint, source, section, match snippet, and local context.
- Export: Writes both machine-readable JSON and analyst-friendly TXT report output.
- Append Report / To AI: Reuses the same workflow as other analysis tabs for session reporting and AI triage.
- ApiHunter Path: Configure
apihunterbinary path (default auto-detection searches runtimePATH, then shell probes (bash -lcandbash -ic) viacommand -v, and copies the discovered absolute path; no static fallback candidates) - Note: ApiHunter is a proprietary tool available at https://github.com/Teycir/ApiHunter
- Runtime PATH Resolve: On
Run ApiHunter, the suite re-resolvesapihunterfrom PATH (process + shell probe) and auto-updates the field to the resolved absolute binary when available - Calibration:
Quick (Desktop Preset),Balanced (Desktop Preset)(default),Deep (Desktop Preset) - Auth Mode:
Unauth Only,Auth Only,Auth + Unauth(default). In dual-pass mode, deduplicated base URLs are split intoauth-associatedandunauth-associatedtarget lists; each pass runs on its own list. Auth association uses both request auth headers and non-header auth signals (auth_detected, token/cookie/session markers in request metadata). - Auth Mode:
Unauth Only,Auth Only,Auth + Unauth(default). In dual-pass mode, deduplicated base URLs are split intoauth-associatedandunauth-associatedtarget lists; each pass runs on its own list. Auth association uses both request auth headers and non-header auth signals (auth_detected, token/cookie/session markers in request metadata). - Top Findings Min: Operator-configurable
Critical/High/Mediumthreshold for summary triage noise control - Use Custom Targets: Checkbox to force ApiHunter input from the
Custom Targets...popup instead of Recon-filtered scope - Custom Targets Popup: Multiline editor (
max 20entries, one per line) with strict sanitization and canonical base URL normalization (scheme://host[:port]/), including de-duplication and invalid-line rejection - Validation Enforcement: When
Use Custom Targetsis enabled, runs fail fast if popup content is empty, exceeds limit, or contains invalid URL lines - Always Filtered Source: Consumes current Recon filtered view and emits de-duplicated host-base targets (
scheme://host[:port]/) for ApiHunter - Run ApiHunter: Executes ApiHunter using ApiHunter-native command behavior (Burp acts as a thin launcher + result renderer)
- Default Command Model: Burp does not apply extra runtime heuristics (no Burp-side watchdog caps or endpoint-expansion overrides); default flags mirror ApiHunter Desktop presets
- Desktop Preset Parity:
Quick:--no-discovery,--max-endpoints 40,--concurrency 4,--timeout-secs 12,--retries 1,--delay-ms 0, and disables heavy scanners (mass-assignment, oauth-oidc, rate-limit, cve-templates, websocket)Balanced:--no-discovery,--max-endpoints 80,--concurrency 5,--timeout-secs 15,--retries 1,--delay-ms 50Deep:--active-checks --response-diff-deep --no-discovery,--max-endpoints 0,--concurrency 6,--timeout-secs 20,--retries 2,--delay-ms 100,--waf-evasion,--per-host-clients,--adaptive-concurrency
- Enable Custom: Opt in to full command override with placeholders (
{apihunter_path},{targets_file},{results_file}) - Custom + Auth Note: In custom mode,
Auth + Unauthdual-pass is blocked; useAuth OnlyorUnauth Only, or disable custom mode for automatic dual-pass execution. - Preset Visibility: Preset dropdown is always visible and seeded with Desktop-equivalent templates
- Stop / PKill Tools: Cancel active runs safely or emergency-stop external scanner processes
- Export Targets: Save filtered/deduped host-base target list for offline ApiHunter usage
- Output: Parsed NDJSON findings summary with severity/scanner/runtime breakdown plus surfaced launcher/parse/runtime errors
- Top Findings Signal Mode: Shows findings returned by ApiHunter command output (sorted by severity with evidence/remediation context)
- Top Findings Display Filtering: Selected minimum severity is applied to Burp Top Findings rendering (
Critical/High/Medium), while scanner output statistics remain complete.
- Nuclei Path: Configure path to nuclei binary
- Auth Mode:
Unauth Only,Auth Only,Auth + Unauth(default). In dual-pass mode, deduplicated base URLs are split intoauth-associatedandunauth-associatedtarget lists; each pass runs on its own list. Auth association uses both request auth headers and non-header auth signals (auth_detected, token/cookie/session markers in request metadata). Auth-context derivation captures best availableAuthorizationheader, top auth-like headers (X-API-Key,Api-Key,ApiKey,X-Auth-Token,X-Access-Token), and derives cookie pairs from requestCookieheaders. - Profile:
Fast,Balanced,DeepAPI-discovery scan presets - Run Nuclei: Execute Nuclei scanner with WAF evasion
- GraphQL Templates: 29+ GraphQL-specific templates for detection and exploitation
- Target Bases...: Open multiline popup to define explicit base URLs/hosts
- Only Base+Derivatives: Restrict scans to popup scope and same base-domain derivatives
- Enable Custom: Opt in to override default command with your own template
- Custom + Auth Note: In custom mode,
Auth + Unauthdual-pass is blocked; useAuth OnlyorUnauth Only, or disable custom mode for automatic dual-pass execution. - Preset Cmd + ? Help: Auto-fill common commands and show usage guidance
- Stop: Cancel active scans safely
- PKill Tools: Emergency kill for
nuclei/httpx/katana/ffuf/kiterunner/waybackurls/gau/sqlmap/dalfox/subfinder/dnsx - Cross-Platform Kill: Uses
taskkillon Windows andpkill(withkillallfallback) on Linux/macOS - Export Targets: Save target list for external scanning
- Features: Header-based spoofing, rate limiting, clear error reporting
- HTTPX Path: Configure path to httpx binary
- Probe Endpoints: Fast HTTP probing with technology detection
- Enable Custom: Opt in to override default command with your own template
- Preset Cmd + ? Help: Auto-fill common probe profiles and usage
- Stop: Cancel active probes safely
- PKill Tools: Emergency kill for scanner processes
- Export URLs: Save URLs for external tools
- Katana Path: Configure path to katana binary
- Crawl Endpoints: Deep web crawling for endpoint discovery
- Target Bases...: Open multiline popup to define explicit base URLs/hosts
- Only Base+Derivatives: Restrict crawls to popup scope and same base-domain derivatives
- Enable Custom: Opt in to override default command with your own template
- Preset Cmd + ? Help: Auto-fill crawl depth profiles and usage
- Stop: Cancel active crawls safely
- PKill Tools: Emergency kill for scanner processes
- Export Discovered: Save discovered endpoints
- Send to Recon: Import discovered endpoints to Recon tab
- FFUF Path: Configure path to ffuf binary
- Wordlist: Select wordlist for fuzzing
- Target Bases...: Open multiline popup to define explicit base URLs/hosts
- Only Base+Derivatives: Restrict fuzzing to popup scope and same base-domain derivatives
- Fuzz Directories: Directory and file fuzzing
- Auto Scope: Prioritizes first-party hosts and filters noisy third-party/CDN targets
- PKill Tools: Emergency kill for scanner processes
- Export Results: Save fuzzing results
- Send to Intruder: Export results to Burp Intruder
- Kiterunner Path: Configure path to local
krbinary - Wordlist/Alias: Use a local
.kitefile or an Assetnote alias such asapiroutes-260227:20000 - Profile:
Fast,Balanced,Deeproute-scan tuning, withBalancedselected by default for wider first-pass coverage;Fastkeeps a tighter 10-minute cap for quicker triage andDeepspends a 15-minute ceiling on fewer hosts with fuller scans - Use Custom Targets: Checkbox to force Kiterunner input from the
Custom Targets...popup instead of Recon-filtered scope - Custom Targets Popup: Multiline editor (
max 20entries, one per line) with strict sanitization and canonical base URL normalization (scheme://host[:port]/) - Target Bases...: Open multiline popup to define explicit base URLs/hosts
- Only Base+Derivatives: Restrict scans to popup scope and same base-domain derivatives
- Run Kiterunner: Scoped API route discovery against either popup-defined base URLs or the current Recon filtered view
- Startup Summary: Prints selected mode, target source, and the target URL list before the scan begins
- Always Filtered Source: When custom targets are off, Kiterunner consumes the current Recon filtered view, so the Recon
Filter Noisecontrol starting selected on launch compresses its default target set - Runtime Boundaries: Kiterunner scans ranked host/base targets instead of every Recon URL and enforces profile-specific host, route-budget, and elapsed-time caps so runs do not sprawl indefinitely
- WAF-Evasion Defaults: Lower concurrency, request delay, forwarded-IP spoof headers, and redirect quarantine controls
- PKill Tools: Emergency kill for scanner processes
- Export Results: Save route-discovery results
- Send to Intruder: Export discovered method/path hits to Burp Intruder
- Date Range: Configure from/to years for historical search
- Limit: Set maximum results to retrieve
- Discover: Query Wayback Machine for historical endpoints
- Target Bases...: Open multiline popup to define explicit base URLs/hosts
- Only Base+Derivatives: Restrict discovery to popup scope and same base-domain derivatives
- Auto Scope: Limits default queries to first-party hosts/paths from Recon
- Noise Exclusion: Drops common ad-tech/tracker hosts in default Wayback mode
- Enable Custom: Opt in to override built-in queries with waybackurls/gau commands
- Preset Cmd + ? Help: Auto-fill passive collection presets and usage
- Stop: Cancel active discovery safely
- PKill Tools: Emergency kill for scanner processes
- Send to Recon: Import discovered endpoints to Recon tab
- Export Results: Save discovered endpoints
- SQLMap Path: Configure path to local
sqlmap - Profile:
Fast,Balanced,Deepcommand tuning presets - Run Verify: Replay SQLi-priority targets and collect evidence-backed confirmations
- Max Targets / Timeout: Control verification breadth and per-target duration
- Stop / PKill Tools: Cancel or emergency-stop tool processes
- Send to Recon: Import verified SQLi endpoints back into Recon for follow-up
- Export Results: Save verification output to file
- Dalfox Path: Configure path to local
dalfox - Profile:
Fast,Balanced,Deepcommand tuning presets - Run Verify: Replay XSS-priority targets and capture Dalfox confirmation output
- Max Targets / Timeout: Tune scan duration and coverage
- Stop / PKill Tools: Cancel active verification or emergency-stop tool processes
- Send to Recon: Import verified XSS candidates to Recon
- Export Results: Save Dalfox findings to file
- Domains Input: Optional manual domains list (comma/newline); auto-derives from Recon when empty
- Profile:
Fast,Balanced,Deepstage tuning forsubfinder/dnsx/httpx - Pipeline: Runs
subfinder→dnsx→httpxfor alive API asset discovery - Run Discovery: Find additional first-party API hosts/URLs beyond captured paths
- Stop / PKill Tools: Cancel staged discovery or emergency-stop tool processes
- Send to Recon: Import discovered assets into Recon
- Export Results: Save discovered URLs
- Spec Source: Load OpenAPI/Swagger file from local path or URL
- Generate OpenAPI: One-click OpenAPI 3.0.3 generation from captured Recon traffic
- Run Drift: Compare observed traffic vs spec and report endpoint/parameter drift
- Findings: Undocumented observed endpoints, missing observed traffic, parameter mismatches
- Stop / PKill Tools: Cancel active drift analysis safely
- Send to Recon: Import spec-missing candidates into Recon for probing
- Export Results: Save drift output report
- Targets Input: Optional manual GraphQL targets (auto-detects from Recon if empty)
- Show Targets: Preview candidate GraphQL endpoints before execution
- Run Analysis: Run GraphQL-focused multi-tool analysis workflow
- Stop / PKill Tools: Cancel active analysis or emergency-stop tools
- Send to Recon: Import GraphQL findings/candidates into Recon
- Export Results: Save GraphQL analysis output
-
BOLA (Broken Object Level Authorization)
- Tests ALL authenticated endpoints
- Horizontal/vertical privilege escalation
- Token manipulation, batch requests
-
IDOR (Insecure Direct Object Reference)
- ID enumeration (numeric, UUID, ObjectID)
- Wildcard injection, encoding bypass
- Parameter pollution
-
SQL Injection
- Boolean-based, union-based, time-based blind
- Error-based, stacked queries
- 38+ payloads
-
XSS (Cross-Site Scripting)
- Reflected parameter exploitation
- Context breaking, polyglot payloads
- Event handlers, template injection
-
NoSQL Injection
- MongoDB operators ($gt, $ne, $regex)
- Array notation, where clause injection
-
JWT Exploitation
- Algorithm confusion (alg:none)
- kid injection, claim manipulation
-
GraphQL Abuse
- Introspection queries (schema extraction)
- Batching attacks (array-based and alias-based)
- Depth attacks (nested query DoS)
- Directive overloading (@skip, @include abuse)
- Field suggestion (typo-based schema discovery)
- Circular fragments (recursive DoS)
- Mutation injection
-
SSTI (Server-Side Template Injection)
- Jinja2, Freemarker, Velocity
- RCE payloads
-
Race Conditions
- TOCTOU exploitation
- Parallel request techniques
-
Business Logic
- Price/quantity manipulation
- Workflow bypass
-
WAF Bypass
- Header injection (X-Forwarded-For, X-Original-URL)
- Encoding bypass (URL, Unicode, Hex, HTML entities)
- HTTP method override (X-HTTP-Method-Override)
- Path manipulation (dot encoding, null bytes, semicolons)
- Content-Type manipulation
- Protocol smuggling (CL.TE, TE.CL)
-
Path Traversal
- Directory traversal payloads
- Encoded path manipulation
- Null byte injection
-
SSRF (Server-Side Request Forgery)
- Internal IP targeting
- Cloud metadata access
- DNS rebinding
-
XXE (XML External Entity)
- File disclosure
- SSRF via XXE
- Denial of Service
-
Deserialization
- Java deserialization
- PHP object injection
- Python pickle exploitation
{
"metadata": {
"timestamp": "20240115_143022",
"total_endpoints": 15,
"total_requests": 47
},
"endpoints": [
{
"endpoint": "GET:/api/users/{id}",
"method": "GET",
"normalized_path": "/api/users/{id}",
"host": "api.example.com",
"sample_count": 3,
"parameters": {
"url": ["id"],
"body": [],
"cookie": ["session"],
"json": []
},
"auth_methods": ["Bearer Token"],
"response_codes": [200, 404],
"content_types": ["application/json"],
"api_patterns": ["REST API", "JSON API", "CRUD: GET"],
"sample_requests": [...]
}
],
"api_structure": {
"api_types": ["REST API", "JSON API"],
"http_methods": ["GET", "POST", "PUT", "DELETE"],
"auth_methods": ["Bearer Token", "API Key"],
"base_paths": ["/api/", "/v1/"]
},
"security_observations": [
{
"type": "Potential IDOR/BOLA",
"severity": "Critical",
"count": 5,
"examples": ["GET:/api/users/{id}", "GET:/api/orders/{id}"],
"recommendation": "Implement object-level authorization checks"
},
{
"type": "Unauthenticated Endpoints",
"severity": "High",
"count": 3,
"examples": ["GET:/api/health", "GET:/api/version"]
},
{
"type": "Weak Encryption (Base64)",
"severity": "High",
"count": 2,
"examples": [{"endpoint": "POST:/api/auth", "types": ["Base64"]}],
"recommendation": "Use proper encryption (AES-256, TLS 1.3)"
}
],
"llm_prompt": "# API Red Team Extension Generation\n\n..."
}- HTTP method and normalized path
- Host, protocol, port
- Query string and all parameter types (URL, body, cookie, JSON)
- Request/response headers
- Request/response bodies (truncated to 20KB)
- Response status codes
- Content types
- Authentication methods detected
- API patterns (REST, GraphQL, SOAP, etc.)
- API structure overview (types, methods, auth, base paths)
- Security observations (unauth endpoints, sensitive data)
- Endpoint grouping and deduplication
- Sample requests for each endpoint
The export includes AI-ready prompts and context that prioritize:
- Sensitive-data exploit paths (cross-account/tenant exposure)
- Unauthorized state changes (workflow/lifecycle abuse)
- Non-obvious logic flaws over duplicate-prone generic findings
- Reproducible evidence deltas and missing-data requests
Primary AI artifacts:
ai_bundle.jsonai_all_tabs_context.jsonai_openai_request.jsonai_anthropic_request.jsonai_ollama_request.json
BurpAPISecuritySuite and APIPentesting are designed to be used together:
- Capture + analyze traffic in BurpAPISecuritySuite.
- In
Recon, clickExport AI Bundle. - In APIPentesting, run:
./scripts/scan-nuclei-prioritize.sh /path/to/ai_bundle.json <scan-name>
- Review
Reports/<scan-name>-<timestamp>/priority.jsonandresults.jsonl. - Use
scripts/AI_TRIAGE_PROMPT.md(from APIPentesting) with your AI UI for sensitive-data-first triage.
Ownership split:
- BurpAPISecuritySuite: in-Burp capture, enrichment, deep-logic analysis, AI/export packaging.
- APIPentesting: external scanning orchestration, ranking, and AI-assisted exploit triage.
# 1. Capture API traffic in Burp
# 2. (Optional) Run Passive Discovery → "Run Invariants"
# 3. (Optional) In Recon, click "Refresh Invariants"
# 4. In Recon, click "Export AI Bundle"
# 5. Run APIPentesting scan from the exported bundle:
# ./scripts/scan-nuclei-prioritize.sh /path/to/ai_bundle.json burp-ai-scan
# 6. Feed Reports/.../priority.json + results.jsonl to AI with
# scripts/AI_TRIAGE_PROMPT.md for sensitive-data-first exploit triage.# 1. Generate fuzzing attacks
# 2. Click "Turbo Intruder" button
# 3. In Burp: Extensions → Turbo Intruder
# 4. Right-click target request → Send to Turbo Intruder
# 5. Load race_condition.py script
# 6. Execute for 50 parallel requests# 1. Generate fuzzing attacks
# 2. Click "Send to Intruder"
# 3. Burp Intruder opens with §markers§ pre-configured
# 4. Load payloads from exported payloads.json
# 5. Launch attack~/burp_APIRecon/
├── FullExport_TIMESTAMP/
│ ├── api_analysis.json
│ └── excalibur_bridge_bundle.json
├── HostExport_HOSTNAME_TIMESTAMP/
│ ├── api_analysis.json
│ └── excalibur_bridge_bundle.json
├── Payloads_TIMESTAMP/
│ └── payloads.json (idor, sqli, xss, nosqli, ssrf, xxe, ssti, deserialization, waf_bypass)
├── AI_Context_TIMESTAMP/
│ ├── ai_context.json
│ ├── ai_bundle.json
│ ├── ai_all_tabs_context.json
│ ├── ai_vulnerability_context.json
│ ├── ai_behavioral_analysis.json
│ ├── ai_counterfactual_differential_findings.json
│ ├── ai_counterfactual_differential_summary.json
│ ├── ai_sequence_invariant_findings.json
│ ├── ai_sequence_evidence_ledger.json
│ ├── ai_golden_ticket_findings.json
│ ├── ai_golden_ticket_ledger.json
│ ├── ai_state_transition_findings.json
│ ├── ai_state_transition_ledger.json
│ ├── ai_token_lineage_findings.json
│ ├── ai_token_lineage_ledger.json
│ ├── ai_parity_drift_findings.json
│ ├── ai_parity_drift_ledger.json
│ ├── ai_openai_request.json
│ ├── ai_anthropic_request.json
│ └── ai_ollama_request.json
├── SequenceInvariant_Export_TIMESTAMP/
│ ├── counterfactual_differential_findings.json
│ ├── counterfactual_differential_summary.json
│ ├── sequence_invariant_findings.json
│ ├── sequence_evidence_ledger.json
│ ├── golden_ticket_findings.json
│ ├── golden_ticket_ledger.json
│ ├── state_transition_findings.json
│ ├── state_transition_ledger.json
│ ├── token_lineage_findings.json
│ ├── token_lineage_ledger.json
│ ├── parity_drift_findings.json
│ └── parity_drift_ledger.json
├── TurboIntruder_TIMESTAMP/
│ ├── race_condition.py
│ ├── bola_enum.py
│ └── jwt_brute.py
├── VersionScan_Export_TIMESTAMP/
│ └── version_scan.txt
├── ParamMiner_Export_TIMESTAMP/
│ └── param_mining.txt
└── NucleiTargets_TIMESTAMP/
└── targets.txt
- Capture Authenticated Traffic: Login first to capture protected endpoints
- Exercise All Features: Click through entire application for complete coverage
- Use Multiple Roles: Capture traffic as admin, user, guest for BOLA detection
- Review Statistics: Check Critical/High/Medium counts in stats panel
- Start with "All": Generate comprehensive attack campaign first
- Focus on High-Risk: Filter by severity for critical endpoints
- Verify Detections: Review generated attacks before sending to Intruder
- Batch Testing: Use Turbo Intruder for race conditions and high-speed enumeration
- Export Context Early: Generate AI context after initial capture
- Run + Refresh Invariants Before Export: Add fresh deep-logic evidence (Differential + Sequence + Golden + State Matrix + Token Lineage + Parity Drift) before sending data to AI
- Iterate Payloads: Use AI-generated payloads, test, refine prompt
- Combine Techniques: Merge AI payloads with built-in payload library
- Nuclei Integration: Run Nuclei for quick vulnerability validation
- Export Targets: Use target lists with ffuf, wfuzz, or custom scripts
- CI/CD Integration: Automate exports for regression testing
- Normalization: Replaces numeric IDs, UUIDs, ObjectIDs with placeholders
- Deduplication: Tracks unique endpoints by method + normalized path
- Truncation: Bodies limited to 20KB, samples limited to 3 per endpoint
- Auth Detection: Identifies Bearer, Basic, API Key, Session Cookie
- Pattern Matching: Regex-based detection for REST, GraphQL, SOAP
- Does not capture WebSocket traffic
- Binary responses not fully analyzed
- Large responses truncated (20KB limit)
- Requires Jython (Python 2.7 syntax)
- API Penetration Testing: Comprehensive fuzzing with 108+ attack vectors
- Bug Bounty Hunting: Automated BOLA/IDOR detection and exploitation
- Security Research: Advanced attack techniques (race conditions, JWT, GraphQL)
- Red Team Operations: Turbo Intruder scripts for high-speed attacks
- AI-Assisted Testing: Generate custom payloads with ChatGPT/Claude
- CI/CD Security: Export targets for automated regression testing
- Training & Education: Learn API vulnerabilities through real-world examples
- Complete Documentation Index
- Architecture Overview
- GraphQL Fuzzing Validation
- Logger++ Tags Reference
Q: Does this work with Burp Suite Community Edition?
A: Yes! All core features work with both Community and Professional editions. However, some advanced Burp features like Scanner integration require Pro.
Q: Why is the extension not capturing traffic?
A: Check that:
- Auto-Capture toggle is enabled in the Recon tab
- You're browsing through Burp's proxy
- The target is sending HTTP/HTTPS traffic (WebSockets not supported)
- Check the Activity Log for any error messages
Q: How do I install Jython?
A: Download Jython Standalone JAR from https://www.jython.org/download, then in Burp: Extender → Options → Python Environment → Select File → Choose the jython-standalone-*.jar file.
Q: How many endpoints can it handle?
A: The extension efficiently handles 500+ endpoints with automatic rotation when the limit (800) is reached. Older endpoints are automatically removed.
Q: Why are responses truncated to 20KB?
A: To prevent memory issues with large responses while preserving useful analysis context. The current default body capture cap is 20KB.
Q: Can I increase the sample limit per endpoint?
A: Yes, use the "Samples" dropdown in the Recon tab (1, 3, 5, or 10 samples per endpoint).
Q: Why am I not seeing any BOLA/Auth Bypass attacks?
A: These attacks require authenticated endpoints. Make sure to:
- Login to the application first
- Capture traffic while authenticated
- Look for endpoints with Bearer tokens, API keys, or session cookies
Q: How do I use the generated attacks?
A: Three ways:
- Burp Intruder: Click "Send to Intruder" for automated testing
- Turbo Intruder: Export scripts for high-speed attacks
- Manual: Use "Copy as cURL" for command-line testing
Q: What's the difference between "All" and specific attack types?
A: "All" generates comprehensive attacks across all vulnerability types. Specific types (e.g., "SQLi") focus only on that vulnerability class for targeted testing.
Q: How do I test GraphQL endpoints effectively?
A: Three-pronged approach:
- Fuzzer Tab: Select "GraphQL" attack type for 40+ GraphQL-specific payloads (introspection, batching, directive overloading, field suggestion)
- Nuclei Tab: Run with
-tags graphqlfor 29+ templates covering misconfigurations and detection - Manual Testing: Use "Copy as cURL" to test introspection, batching, and depth attacks manually
The Fuzzer detects GraphQL endpoints automatically and generates attacks for:
- Schema extraction via introspection
- DoS via batching (array/alias) and depth attacks
- Field suggestion for schema discovery when introspection is disabled
- Directive overloading (@skip, @include abuse)
- Circular fragment DoS
- Unauthorized mutations
Q: Do I need to install ApiHunter/Nuclei/HTTPX/Katana/FFUF/Kiterunner?
A: Only if you want to use those specific tabs. The core extension works without them. Install from:
- ApiHunter: https://github.com/Teycir/ApiHunter (proprietary tool - requires separate installation or local build at
~/Repos/ApiHunter, then buildtarget/release/apihunter) - Nuclei: https://github.com/projectdiscovery/nuclei
- HTTPX: https://github.com/projectdiscovery/httpx
- Katana: https://github.com/projectdiscovery/katana
- FFUF: https://github.com/ffuf/ffuf
- Kiterunner: https://github.com/assetnote/kiterunner
Q: Where should I install these tools?
A: Default paths:
~/Repos/ApiHunter/target/release/apihunter~/go/bin/nuclei~/go/bin/httpx~/go/bin/katana~/go/bin/ffuf~/.local/bin/kr- On Windows, common defaults are under
C:\\Users\\<you>\\go\\bin\\*.exe
Or configure custom paths in each tab.
Tabs now auto-detect both Unix-style and Windows *.exe Go-bin locations when present.
Q: How do custom command overrides work?
A:
- Leave
Enable Customunchecked to use safe built-in defaults. - Check
Enable Customto run exactly what you type in the command box. - Use
Preset Cmd...to auto-fill common commands quickly (still opt-in untilEnable Customis checked). - Click
?to see placeholders and examples for each tab. - Custom commands run with
cmd /con Windows andbash/sh -lcon Linux/macOS. - Built-in HTTPX and Katana defaults use native list-file flags (
-l/-list) for cross-platform execution.
- Custom command mode is intentionally strict and opt-in (
Enable Custommust be checked). - Rendered custom commands are validated for forbidden shell fragments (for example command chaining/redirection/subshell syntax).
- Executables are restricted by per-tool allow-lists in custom mode (for example
nuclei,httpx,katana,waybackurls/gau,apihunter,subfinder). - Placeholder context values are sanitized before template rendering, and quoted variants are available (
{targets_file_q},{urls_file_q}, etc.) for safer path interpolation. - If your workflow needs complex shell logic outside this policy, run that command manually outside the extension.
Q: Why does HTTPX show invalid option errors?
A:
- Make sure you are using ProjectDiscovery
httpx, not the PythonhttpxCLI tool. - Recommended path:
~/go/bin/httpx. - The extension now validates local tool signatures and shows a fix hint when mismatched.
Q: How do I fill Guest/User/Admin headers for Auth Replay quickly?
A:
- In
Auth Replay, clickExtractnext to Guest/User/Admin. - A searchable popup opens with captured header candidates.
- Filter by endpoint text, header name, or token fragment.
- Select one item and click
OK; the field is filled inName: valueformat.
Q: Where are exported files saved?
A: All exports go to ~/burp_APIRecon/ with timestamped subdirectories. Check the Activity Log for exact paths.
Q: How do I use the AI Context export?
A:
- (Optional) Run
Passive Discovery→Run Invariants - (Optional) In the
Recontab, clickRefresh Invariants - In the
Recontab, clickExport AI Bundle - Use APIPentesting to scan from that export:
./scripts/scan-nuclei-prioritize.sh /path/to/ai_bundle.json burp-ai-scan
- Feed
Reports/.../priority.json+results.jsonlto your AI UI using APIPentestingscripts/AI_TRIAGE_PROMPT.md - Use
ai_sequence_evidence_ledger.json,ai_golden_ticket_ledger.json, andai_state_transition_ledger.jsonto prioritize what to validate first
Q: Can I import previously exported data?
A: Yes. Import accepts:
api_analysis.json(BurpAPISecuritySuite export)- Excalibur
.harexports (Excalibur is a proprietary tool: https://github.com/Teycir/Excalibur) - Excalibur
-replay-studio.json/-cookies.json/-insights.jsonsidecars (auto-discovered from the same session prefix) excalibur_bridge_bundle.json(schema: excalibur-burp-bridge/v1)
If Excalibur artifacts are detected, the tool auto-runs Refresh Invariants after import so Differential + Sequence + Golden + State + Token Lineage + Parity Drift caches are immediately ready.
Q: Can I send captured requests to Postman or Insomnia?
A: Yes. In the Recon tab, use:
Postmanto exportpostman_collection.json(Collection v2.1)Insomniato exportinsomnia_collection.json(Insomnia import format)- Both support scope selection:
All Endpoints,Filtered View, orCurrent Host.
Q: Extension loaded but not showing in tabs?
A: Check Burp's Extender → Extensions tab for errors. Common issues:
- Jython not configured correctly
- Python 2.7 syntax errors (extension uses Jython/Python 2.7)
- Insufficient memory (increase Burp's heap size)
Q: "No endpoints captured" message?
A: Ensure:
- You're actively browsing through Burp proxy
- Auto-Capture is enabled
- Target is making HTTP requests (not just loading static files)
- Check if endpoints are being filtered (images/fonts are auto-filtered)
Q: Nuclei/HTTPX scan hangs or times out?
A:
- Check tool is installed and path is correct
- Verify network connectivity to targets
- Large scans may still take several minutes (default max timeout: 15 minutes)
- Use Target Bases... with Only Base+Derivatives to force strict single-target scope
- Use the Stop button in the same tab to cancel running external tools
- Check Activity Log for detailed error messages
Q: Why are some endpoints marked as "Critical" or "High"?
A: Severity is based on:
- Critical: Debug/admin endpoints, unauthenticated IDOR/BOLA
- High: Authenticated IDOR/BOLA, sensitive data exposure, weak encryption
- Medium: Error responses, reflected parameters
- Info: Standard endpoints
Q: How do I test for race conditions?
A:
- Generate fuzzing attacks (Fuzzer tab)
- Click "Turbo Intruder" button
- Load the exported
race_condition.pyscript in Burp's Turbo Intruder - Configure for 50+ parallel requests
Q: Can I customize attack payloads?
A: Yes! Export payloads to JSON, modify them, then:
- Use in Burp Intruder manually
- Feed to AI for enhancement
- Create custom scripts with the payload library
Q: How do I compare two API versions?
A:
- Export API data from version 1 ("Export All")
- Clear data and capture version 2
- Export version 2
- Use Diff tab → Load both exports → Compare
Q: What's the best workflow for bug bounty hunting?
A:
- Capture authenticated traffic (all user roles)
- Review Critical/High severity endpoints first
- Generate "All" attacks in Fuzzer
- Focus on BOLA/IDOR endpoints
- Use Version Scanner to find legacy APIs
- Run Param Miner on high-value endpoints
- Export to Nuclei for automated validation
- Clean Jython Architecture: Modular design with testable core logic
- Modular Extraction: Heavy workflows extracted to helper modules (
heavy_runners.py,ai_prep_layer.py,behavior_analysis.py) - Smart Detection: Context-aware vulnerability identification
- Performance Optimized: Handles 500+ endpoints efficiently
- Cross-Platform: Works on Windows, macOS, Linux
- Extensible: Easy to add new attack types and payloads
- Professional UI: Color-coded severity, tabbed interface, real-time stats
- Replay Coverage: Includes golden replay corpus tests for sequence invariant detection + confidence ledger output
Need custom security tools or API testing solutions? I build production-ready applications and security tools.
- ApiHunter - Automated API reconnaissance and security testing tool with intelligent endpoint discovery
- TimeSeal (GitHub) - Cryptographic time-locked vault and dead man's switch with zero-trust encryption
- Ghost Chat - Secure P2P chat with WebRTC, no server storage, self-destruct timers
- BurpCopyIssues - Burp Suite extension for browsing, copying, and exporting scan findings
- BurpWpsScan - WordPress security scanner for Burp Suite with WPScan API integration
- Excalibur - API attack-surface discovery and session workflow tooling for practical pentest operations (proprietary tool)
- APIPentesting - Burp-first external scanning and exploit-triage companion workflow for API bug bounty hunting
- Custom Security Tools - Burp extensions, API testing frameworks, automation scripts
- 🔒 Security Tool Development - Custom Burp extensions, penetration testing tools, automation frameworks
- 🚀 Web Application Development - Full-stack development with modern technologies
- 🔧 API Security Consulting - Architecture review, vulnerability assessment, remediation guidance
- 🤖 AI Integration - LLM-powered security tools, automated payload generation, intelligent fuzzing
Get in Touch: teycirbensoltane.tn | Available for freelance projects and consulting
Developed by Teycir Ben Soltane
MIT License - Free to use for authorized security testing and research purposes.
See CHANGELOG.md for full release history.
Run python3 scripts/sync_readme_updates.py to regenerate this block from CHANGELOG.md.
- Removed: Vulners tab and all associated functionality due to Cloudflare bot protection blocking API access
- Removed: Vulners API integration (403 Forbidden errors cannot be bypassed)
- Removed: Vulners fingerprint collection and CVE advisory features
- Removed: All Vulners-related UI components, methods, and exports
- Changed: Tab numbering updated after Vulners removal (Nuclei is now tab 9 instead of 10)
- Changed: Documentation updated to reflect removal of Vulners functionality
- Added: Better filter management with improved filter organization and UI controls for better usability
- Added: Enhanced filter state tracking and persistence
- Added: Streamlined filter application workflows across modules
- Added: ApiHunter
Auth Modecontrol in the tab UI (Unauth Only,Auth Only,Auth + Unauthdefault dual-pass mode) - Added: Nuclei
Auth Modecontrol in the tab UI (Unauth Only,Auth Only,Auth + Unauthdefault dual-pass mode) - Added: Auth-context derivation for ApiHunter authenticated runs from Recon-filtered traffic (captures best available
Authorizationheader, top auth-like headers, derives cookie pairs from requestCookieheaders) - Added: Auth-context derivation for Nuclei authenticated runs from Recon-filtered traffic (captures best available
Authorizationheader, top auth-like headers, derives cookie pairs and injects them asCookie:request headers) - Changed: ApiHunter runner now supports multi-pass execution per run (dual-pass unauth + auth when
Auth + Unauthis selected, per-pass command/output/status rendering) - Changed: Nuclei runner now supports multi-pass execution per run (dual-pass unauth + auth when
Auth + Unauthis selected, per-pass command/output/status rendering, aggregateNUCLEI MULTI-PASS SUMMARY) - Changed: ApiHunter findings storage now aggregates across all passes in the same run instead of replacing with only the last pass
- Changed: Custom-command behavior updated for auth-mode compatibility (
Auth + Unauthis blocked whileEnable Customis checked;Auth Onlyin custom mode appends derived auth headers/cookies) - Changed: ApiHunter
Auth + Unauthrun planning now splits deduplicated base targets into auth-associated and unauth-associated lists; each pass runs only on its corresponding list - Changed: Refactored auth-target split extraction into one shared helper engine used by both Nuclei and ApiHunter runners for consistent auth/unauth classification behavior
- Tests: Updated feature-contract expectations for ApiHunter and Nuclei auth-mode wiring plus labeled result summaries
- Added: Fuzzer host-base relaxation fallback for narrow single-base scopes
- Changed: Refactored
_collect_fuzzer_targetsto use an internal_run_target_filter_passhelper for cleaner dual-pass logic (strict + relaxed fallback) - Changed: Fuzzer metadata now includes
host_base_relaxed(bool) andhost_base_relax_added(int) for operator visibility into fallback behavior - Tests: Updated
tests/test_feature_contracts.pyto assert relaxation logic tokens and summary output format
- Fixed: Improved Recon -> Logger detail navigation visibility
- Fixed: Updated feature-contract coverage for the Recon->Logger highlight behavior to prevent regression
- Removed: GraphQL
Generate Raideraction button from the GraphQL tab - Removed: GraphQL
Analyze Schemaworkflow and related schema UI controls - Removed: Local schema-analysis/inql-like helper pipeline from GraphQL tooling
- Removed: GraphQL Raider
Include Schema Opstoggle and schema-coupled profile handling
- Added: New
Sensitive Datatab for regex-driven API-sensitive data extraction - Added: Sensitive findings export flow
- Changed: Updated tab documentation/index to include the new
Sensitive Dataworkflow in operator quick references
- Added: Enhanced Wayback Machine rate limiting and reliability with intelligent retry logic and exponential backoff
- Added: Request throttling to respect API rate limits
- Added: Better error handling for timeout and connection issues
- Added: Improved progress reporting during long-running Wayback queries
- Fixed: Recon/Logger UI freeze issues during high-volume traffic capture with background worker threads
- Fixed: Auth Replay UI responsiveness during heavy replay runs with buffered result rendering
- Changed: Auth Replay execution now isolates UI updates from the hot replay loop with buffered off-EDT rendering
- Changed: Recon/Logger capture pipeline now applies anti-freeze traffic policy with
capture_extender_traffic = falseruntime default - Fixed: UI freeze/stall behavior during heavy Auth Replay runs caused by capture/UI churn
- Fixed: Responsiveness degradation in Recon and Logger when extension-generated traffic was re-captured during active extension workflows
- Added: Native Vulners enrichment workflow with dedicated
Vulnerstab (positioned betweenApiHunterandNuclei) - Added: Software/version fingerprint collection from filtered Recon traffic plus optional custom-target fingerprint collection
- Added: Advisory enrichment output with ranked top findings sorted by severity with CVE IDs and references
- ✅ Added standalone Passive deep-logic actions:
Run Token LineageRun Parity Drift
- ✅ Added high-ROI parity/drift checks that many scanners miss:
- Cross-interface parity (REST vs GraphQL vs internal),
- cache/auth drift,
- time-window authorization drift,
- workflow state-machine breaking,
- cross-tenant identifier collisions,
- content-type policy drift,
- error-oracle intelligence,
- replay-after-delete/deactivate checks.
- ✅ Added parity/drift artifacts:
parity_drift_findings.jsonparity_drift_ledger.jsonai_parity_drift_findings.jsonai_parity_drift_ledger.json
- ✅ Added additive capture timing metadata for drift timing analysis:
captured_atcaptured_at_epoch_ms
- ✅ Extended
Run Invariants,Refresh Invariants, and Recon status line withParitycache coverage. - ✅ Added Excalibur bridge interoperability (Excalibur is a proprietary tool: https://github.com/Teycir/Excalibur):
Importnow parses Excalibur.harplus session sidecars (-replay-studio.json,-cookies.json,-insights.json).Importauto-runs deep-logic invariant refresh when Excalibur artifacts are detected.Export All/Export Hostnow writeexcalibur_bridge_bundle.jsonusing schemaexcalibur-burp-bridge/v1.
- ✅ Added scoreless, non-destructive
Run Differentialworkflow inPassive Discovery. - ✅ Added
Token Lineageanalysis to detect logout/revoke/refresh-session drift from captured traffic. - ✅ Added counterfactual differential artifacts to
Export Ledger:counterfactual_differential_findings.jsoncounterfactual_differential_summary.json
- ✅ Added token-lineage artifacts to
Export Ledger:token_lineage_findings.jsontoken_lineage_ledger.json
- ✅ Added AI export artifacts:
ai_counterfactual_differential_findings.jsonai_counterfactual_differential_summary.jsonai_token_lineage_findings.jsonai_token_lineage_ledger.json
- ✅ Extended
Run Invariantsand ReconRefresh Invariantsto include Differential + Token Lineage cache generation. - ✅ Hardened error visibility in differential parsing path (parse failures are logged, not hidden).
- ✅ Added a single red Logger
Clear Dataaction with shared behavior (clears both Recon and Logger state). - ✅ Removed duplicate Logger clear buttons so toolbar behavior is unambiguous.
- ✅ Split Logger controls into a two-line toolbar so key actions stay visible on smaller window widths.
- ✅ Hardened Logger Tags rendering fallback to plain tag tokens (prevents literal HTML-like tag leakage in table cells).
- ✅ Added Logger/Recon parity flow so Logger-selected rows consistently resolve endpoint details in Recon.
- ✅ Improved
Show Endpoint Detailwith recovery path for rows not yet materialized in Recon cache. - ✅
ReqMandRespMnow show meaningful default marker metrics even without active regex. - ✅ Added Logger table header sorting with multi-column support (Shift+click adds a second sort key).
- ✅ Added simple, consistent tooltip coverage for buttons and checkboxes using explicit + fallback tooltip wiring.
- ✅ Added shared
Filter Noisebehavior in both Recon and Logger surfaces. - ✅ Simplified Logger capture UX to a single toggle model (
Logging Off). - ✅ Added freeze mitigation after reload:
- disabled live resort-on-update for Logger table,
- made logger->recon sync hot path bounded/lightweight,
- skipped heavy recon sync work during bulk logger backfill.
v1.3.9 - Logger Tab + Recon Hidden Params + Param Intel
- ✅ Added dedicated
Loggertab with long-session controls, previews, filters, exports, and right-click triage actions. - ✅ Added Recon
Hidden Paramsworkflow for ranked hidden-parameter discovery from scoped capture data. - ✅ Added Recon
Param Intelworkflow for GAP-style parameter intelligence and exports. - ✅ Added Recon
Turbo Packexport helpers and Logger/Recon tag interoperability.
What is already shipped:
-
✅ Recon-centered AI export flow:
Export AI Bundleis now in Recon (not Fuzzer), because it exports context from all tabs. -
✅ Scoreless counterfactual differential workflow:
Run DifferentialinPassive Discoverydetects representation/auth/identifier precedence drift from captured traffic only.- Included in
Run Invariants, ReconRefresh Invariants,Export Ledger, andExport AI Bundle. - New artifacts:
counterfactual_differential_findings.jsoncounterfactual_differential_summary.jsonai_counterfactual_differential_findings.jsonai_counterfactual_differential_summary.json
-
✅ Deep-logic invariant workflow:
Run InvariantsinPassive Discoverychecks captured endpoint flows for hidden logic issues.Refresh InvariantsinReconrecomputes invariants before AI export.Export Ledgersaves invariant findings and confidence evidence as JSON.
-
✅ Token Lineage checks shipped:
- Detects token lifecycle drift (logout/revoke success with continuing protected access, refresh overlap, parallel token sprawl per subject).
- Included in
Run Invariants,Refresh Invariants,Export Ledger, andExport AI Bundle.
-
✅ Cross-Interface Parity + Drift checks shipped:
- Detects cross-interface auth parity breaks (REST vs GraphQL vs internal), cache/auth drift, time-window auth flips, cross-tenant identifier collisions, parser/content-type policy drift, error-oracle hints, and replay-after-delete/deactivate leaks.
- Included in
Run Parity Drift,Run Invariants,Refresh Invariants,Export Ledger, andExport AI Bundle.
-
✅ AI bundle expanded with deep-logic evidence:
ai_sequence_invariant_findings.jsonai_sequence_evidence_ledger.jsonai_golden_ticket_findings.jsonai_golden_ticket_ledger.jsonai_token_lineage_findings.jsonai_token_lineage_ledger.jsonai_parity_drift_findings.jsonai_parity_drift_ledger.json
-
✅ Non-destructive AI prep layer (optional via
AI_PREP_LAYER):ai_prep_invariant_hints.jsonai_prep_sequence_candidates.jsonai_prep_evidence_graph.json
-
✅ New verification/discovery coverage:
SQLMap Verify,Dalfox Verify,API Assets,OpenAPI Drift,GraphQLtab wiring and exports.
-
✅ ApiHunter integration shipped:
- Dedicated
ApiHuntertab placed beforeNuclei. - Default calibration is
Deep Search (WAF Evasive Recommended). - Runner always consumes filtered Recon endpoints and canonical de-duplicated targets.
- Dedicated
-
✅ Operator UX upgrades:
- Recon
Button Help - Tooltip coverage across tabs with simpler invariant wording
Tool Health, stop controls, and emergencyPKill Toolsflow for external runners.
- Recon
-
✅ Stability + maintainability upgrades:
- Heavy logic extracted into
heavy_runners.py,ai_prep_layer.py,behavior_analysis.pyto reduce Jython compile-size pressure. - Added contract tests and golden replay fixtures for invariant/ledger behavior.
- Heavy logic extracted into
-
✅ Golden Ticket checks shipped:
- Detects possible "master-key token" behavior from captured traffic.
- Included in
Run Invariants,Refresh Invariants,Export Ledger, andExport AI Bundle.
-
✅ State Transition Matrix checks shipped:
- Detects workflow/state drift patterns (write/read overlap, auth variance, transition inconsistencies).
- Included in
Run Invariants,Refresh Invariants,Export Ledger, andExport AI Bundle.
- ✅ Moved AI export action to Recon as
Export AI Bundle(all-tab scope) - ✅ Added sequence/state deep-logic workflow in Passive Discovery:
Run Invariants+Export Ledger - ✅ Added Recon-side
Refresh Invariantsand invariant status line before AI export - ✅ Added AI export artifacts: sequence invariant findings + confidence/evidence ledger
- ✅ Simplified invariant tooltip wording for clearer operator guidance
- ✅ Added behavior-level golden replay tests for sequence invariant coverage
- ✅ Reordered tabs to keep internal workflow tabs first and external tooling tabs last
- ✅ External tab order aligned to:
ApiHunter → Nuclei → HTTPX → Katana → FFUF → Wayback → SQLMap Verify → Dalfox Verify → API Assets → OpenAPI Drift - ✅ Updated Tab Overview documentation to match the actual in-app tab order
- ✅ Added
Passive Discoveryto the Tab Overview section for full coverage
- ✅ Added
SQLMap Verifytab for evidence-backed SQLi confirmation from fuzzer candidates - ✅ Added
Dalfox Verifytab for reflected XSS confirmation with proof output - ✅ Added
API Assetstab usingsubfinder+dnsx+httpxto discover alive API assets - ✅ Added
OpenAPI Drifttab to compare observed traffic against OpenAPI/Swagger docs - ✅ Added
Send to Recon,Export,Stop, andPKill Toolsworkflows across new tabs
- ✅ Expanded GraphQL payloads from 5 to 40+ attack vectors
- ✅ Added field suggestion attacks for schema discovery when introspection is disabled
- ✅ Added directive overloading (@skip, @include abuse) for DoS
- ✅ Added circular fragment attacks for recursive DoS
- ✅ Improved introspection queries (queryType, mutationType, __type)
- ✅ Enhanced batching attacks (array-based and alias-based)
- ✅ Added GraphQL testing guidance and Nuclei template integration docs
- ✅ Optimized Nuclei for 5-10x faster scans (2-5 min vs 15+ min timeouts)
- ✅ Reduced tag set from 10 to 4 tags for focused API discovery
- ✅ Faster timeout (8s), fewer retries (1), higher rate limit (100 req/s)
- ✅ More concurrency (20 connections) for parallel execution
- ✅ Updated "Recon Fast" preset with optimized parameters
- ✅ Added
NUCLEI_OPTIMIZATION.mddocumentation
- ✅ Added
Auth Replaytab for multi-profile authorization regression checks - ✅ Added replay scope controls (
Selected Endpoint,Filtered View,All Endpoints) - ✅ Added profile header fields for
Guest,User, andAdmin - ✅ Added
Extracthelper with searchable popup for captured header selection - ✅ Added replay cancellation support with dedicated
Stopcontrol - ✅ Improved replay logging and selection feedback in output
- ✅ Custom command override with validation for Nuclei, HTTPX, Katana, and Wayback
- ✅ Preset command dropdowns and expanded
?help popups for external tools - ✅ Cross-platform stop controls for external tool runs (Windows/macOS/Linux)
- ✅ Local binary compatibility checks (including HTTPX CLI mismatch detection)
- ✅ Stronger command failure reporting with actionable remediation hints
- ✅ 15 attack types with 108+ vectors
- ✅ BOLA-specific fuzzing for all authenticated endpoints
- ✅ Auto-configured Burp Intruder export
- ✅ AI context export for custom payload generation
- ✅ Turbo Intruder script generation
- ✅ Race condition detection and exploitation
- ✅ JWT, GraphQL, SSTI, Deserialization attacks
- ✅ Business logic testing (price/quantity manipulation)
- ✅ WAF bypass techniques (header injection, encoding, method override)
- ✅ Version scanner with presets
- ✅ Parameter miner with smart detection
- ✅ Diff comparison for API changes
- ✅ External tool integration (Nuclei, HTTPX, Katana, FFUF, Wayback)
- ✅ JWT automatic detection and security analysis
- ✅ Pagination for large endpoint lists
- ✅ cURL export for manual testing













