Co-Pilot / 辅助式
更新于 a month ago

burpsuite-project-parser

Ttrailofbits
1.8k
trailofbits/skills/plugins/burpsuite-project-parser
82
Agent 评分

💡 摘要

此技能提取并分析Burp Suite项目文件中的数据,以进行安全审计。

🎯 适合人群

安全分析师渗透测试人员DevSecOps工程师软件开发人员合规官

🤖 AI 吐槽:看起来很能打,但别让配置把人劝退。

安全分析低风险

风险:Low。建议检查:是否执行 shell/命令行指令;是否发起外网请求(SSRF/数据外发);文件读写范围与路径穿越风险。以最小权限运行,并在生产环境启用前审计代码与依赖。

Burp Suite Project Parser

Search and extract data from Burp Suite project files (.burp) for use in Claude

Author: Will Vandevanter

Prerequisites

  • Burp Suite Professional - Required for project file support
  • burpsuite-project-file-parser extension - Must be installed in Burp Suite (Available: https://github.com/BuffaloWill/burpsuite-project-file-parser)
  • jq (optional) - Recommended for formatting/filtering JSON output

When to Use

Use this skill when you need to get the following from a Burp project:

  • Search response headers or bodies using regex patterns
  • Extract security audit findings and vulnerabilities
  • Dump proxy history or site map data for analysis
  • Programmatically analyze HTTP traffic captured by Burp Suite

Trigger phrases: "search the burp project", "find in burp file", "what vulnerabilities in the burp", "get audit items from burp"

What It Does

This skill provides CLI access to Burp Suite project files through the burpsuite-project-file-parser extension:

  1. Search headers/bodies - Find specific patterns in captured HTTP traffic using regex
  2. Extract audit items - Get all security findings with severity, confidence, and URLs
  3. Dump traffic data - Export proxy history and site map entries as JSON
  4. Filter output - Use sub-component filters to optimize performance on large projects

Installation

/plugin install trailofbits/skills/plugins/burpsuite-project-parser

Usage

Base command:

scripts/burp-search.sh /path/to/project.burp [FLAGS]

Available Commands

| Command | Description | Output | |---------|-------------|--------| | auditItems | Extract all security findings | JSON: name, severity, confidence, host, port, protocol, url | | proxyHistory | Dump all captured HTTP traffic | Complete request/response data | | siteMap | Dump all site map entries | Site structure | | responseHeader='.*regex.*' | Search response headers | JSON: url, header | | responseBody='.*regex.*' | Search response bodies | Matching content |

Sub-Component Filters

For large projects, filter to specific data to improve performance:

proxyHistory.request.headers # Only request headers proxyHistory.request.body # Only request body proxyHistory.response.headers # Only response headers proxyHistory.response.body # Only response body

Same patterns work with siteMap.*

Examples

Search for CORS headers:

scripts/burp-search.sh project.burp "responseHeader='.*Access-Control.*'"

Get all high-severity findings:

scripts/burp-search.sh project.burp auditItems | jq 'select(.severity == "High")'

Find server signatures:

scripts/burp-search.sh project.burp "responseHeader='.*(nginx|Apache|Servlet).*'"

Extract request URLs from proxy history:

scripts/burp-search.sh project.burp proxyHistory.request.headers | jq -r '.request.url'

Search for HTML forms:

scripts/burp-search.sh project.burp "responseBody='.*<form.*action.*'"

Output Format

All output is JSON, one object per line. Pipe to jq for formatting or use grep for filtering:

scripts/burp-search.sh project.burp auditItems | jq . scripts/burp-search.sh project.burp auditItems | grep -i "sql injection"
五维分析
清晰度9/10
创新性7/10
实用性9/10
完整性8/10
可维护性8/10
优缺点分析

优点

  • 自动化从Burp Suite提取数据。
  • 支持正则表达式进行灵活搜索。
  • 以JSON格式输出,便于集成。

缺点

  • 需要Burp Suite Professional。
  • 依赖外部jq工具进行格式化。
  • 仅限于Burp Suite项目文件。

相关技能

mcpspy

A
toolCo-Pilot / 辅助式
86/ 100

“MCPSpy:因为谁不想窥探他们 AI 的秘密?”

ffuf-skill

A
toolCo-Pilot / 辅助式
84/ 100

“这个技能本质上是一个美化版的 ffuf 手册页,提供专家指导但没有实际的自动化或集成功能。”

static-analysis

A
toolCo-Pilot / 辅助式
82/ 100

“看起来很能打,但别让配置把人劝退。”

免责声明:本内容来源于 GitHub 开源项目,仅供展示和评分分析使用。

版权归原作者所有 trailofbits.