This ReadMe is just a list of the Burp extensions and other scripts I have here. For details look at the file extensions_brief_summary or download the code itself :)
- Search and fuzz all valid directories on a website
- Detect CSRF tokens in requests
- Detecting invalid Referers in case a Referer is used for protecting against CSRF
- Download all JS files on a site
- Record all cookies and their attributes
- Record third party referers
- Identify candidates for URL redirection, LFI and RFI
- Detect version information leakage in headers or response bodies
- Remove session cookie and reissue request to check Direct requests
- Test PUT and DELETE on every single directory that you browse
- Scan all SSL hosts in Proxy history
- A couple of per_request_decoders of key parts of the request.
- Extension which makes Direct requests as a request appears in Proxy History
- Make requests without some cookies to identify which cookie is useful
- Fuzz the antiCSRF token to check if random tokens are valid
- One click to set positions for requests in Intruder
- Toggle request method for every request and see if anything changes
- Clickjacking POC generator
- Wrapper to try and fuzz file upload features
Other scripts/tools/fuzz lists/misc :)
- Request every single HTTPS request over HTTP
- Custom fuzzing lists for specific situations
- Code for all extensions has been modularized. List of functions in modules is present in modules/modules_functions_readme
Tips:
-
Add 2 slashes for configuring your modules path on Windows. Every extension needs this - as of now extensions search for webcommon.py inside a directory called 'modules' - this is in the same directory as all the Burp Extensions. An example would be C:\tools\extensions\modules\. A single slash is enough for Linux systems.
-
Some extensions work best as you browse the application. Others work best when the entire application is browsed and you have all your requests inside Burp's history. Refer the file 'scripts_brief_summary' before starting to work.