Skip to content

mathis2001/Burp-Bambda

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Simple list of custom bambdas for "custom actions" and proxy history filtering

How to import

Custom Actions

  1. Download the scripts
git clone https://github.com/mathis2001/Burp-Bambda
  1. Open Burp,
  2. Go to "Extension",
  3. Go to "Bambda Library",
  4. Click on "Import",
  5. Import the scripts.

Then to use them:

  1. Go to "Repeater",
  2. Then go to "Custom Actions",
  3. Click on "Load" and choose the wanted script.

HTTP History Filters

  1. Download the scripts,
git clone https://github.com/mathis2001/Burp-Bambda
  1. Open Burp,
  2. Go to "Extension",
  3. Click on "Import",
  4. Import the scripts.

Then to use them:

  1. Go to "Proxy",
  2. Click on the "Filter settings" bar,
  3. Choose the "Bambda mode",
  4. Click on "Load" and choose the wanted script,
  5. Finally, click on "Apply & close".

Scripts usage

Access-Controls-Testing.bambda

Allows you to define a list of (bearer) tokens for different roles/users of the application and repeat the original request with each of them. Then it return the status code and the body of the responses.

Screenshot

BAC-testing

AuthorizationMethodTests.bambda

Repeat the original request with different Authorization methods (Basic, Bearer and NTLMSSP) and values to check how they are handled.

Screenshot

Capture

HTTP-Methods-Fuzzing.bambda

Repeat the original request with a list of HTTP methods and return the status code and body of the request.

Screenshot

Http-methods

IP-Spoofing-Tests.bambda

Repeat the request with HTTP headers often used to spoof the client IP like X-Client-IP, X-Forwarded-For etc to check for IP restriction bypasses.

Screenshot

Capture

JS-Functions-Analysis.bambda

Highlight HTTP responses containing potentially dangerous JS Functions in the HTTP history

Screenshot

[ToDo]

ParamHighlighter.bambda

Highlight HTTP requests containing parameters that are often vulnerable to SSRF (Yellow), SQLi (Red), XSS (Blue), LFI (Orange), Open Redirect (Green) and RCE (White)

Screenshot

image

URL-match-and-replace.bambda

Match any HTTPS URLs in requests and replace them by a burp collaborator payload.

Screenshot

image

API-Spec-Overview.bambda

Analyze selected Swagger/OpenAPI specification with AI to give some hints based on the OWASP API top 10.

Screenshot

image

About

Burp Suite Bambda useful scripts.

Topics

Resources

Stars

Watchers

Forks

Contributors