sleeyax / burp-awesome-tls

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
GNU General Public License v3.0
991 stars 66 forks source link

error on burp #40

Closed xcypher78 closed 7 months ago

xcypher78 commented 7 months ago

java.lang.NumberFormatException: Cannot parse null string at java.base/java.lang.Integer.parseInt(Integer.java:630) at java.base/java.lang.Integer.parseInt(Integer.java:784) at burp.Settings.getHttpTimeout(Settings.java:68) at burp.SettingsTab.(SettingsTab.java:44) at burp.BurpExtender.registerExtenderCallbacks(BurpExtender.java:33) at burp.Zcp.Zi(Unknown Source) at burp.Zu1y.ZY(Unknown Source) at burp.Zu11.lambda$initialiseOnNewThread$0(Unknown Source) at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:539) at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1136) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:833)

sleeyax commented 7 months ago

Duplicate of: https://github.com/sleeyax/burp-awesome-tls/issues/15. See the last comment for a temporary solution.