Skip to content

Latest commit

 

History

History
114 lines (65 loc) · 2.92 KB

File metadata and controls

114 lines (65 loc) · 2.92 KB

Simple list of custom bambdas for "custom actions" and proxy history filtering

How to import

Custom Actions

  1. Download the scripts
git clone https://github.com/mathis2001/Burp-Bambda
  1. Open Burp,
  2. Go to "Extension",
  3. Go to "Bambda Library",
  4. Click on "Import",
  5. Import the scripts.

Then to use them:

  1. Go to "Repeater",
  2. Then go to "Custom Actions",
  3. Click on "Load" and choose the wanted script.

HTTP History Filters

  1. Download the scripts,
git clone https://github.com/mathis2001/Burp-Bambda
  1. Open Burp,
  2. Go to "Extension",
  3. Click on "Import",
  4. Import the scripts.

Then to use them:

  1. Go to "Proxy",
  2. Click on the "Filter settings" bar,
  3. Choose the "Bambda mode",
  4. Click on "Load" and choose the wanted script,
  5. Finally, click on "Apply & close".

Scripts usage

Access-Controls-Testing.bambda

Allows you to define a list of (bearer) tokens for different roles/users of the application and repeat the original request with each of them. Then it return the status code and the body of the responses.

Screenshot

BAC-testing

AuthorizationMethodTests.bambda

Repeat the original request with different Authorization methods (Basic, Bearer and NTLMSSP) and values to check how they are handled.

Screenshot

Capture

HTTP-Methods-Fuzzing.bambda

Repeat the original request with a list of HTTP methods and return the status code and body of the request.

Screenshot

Http-methods

IP-Spoofing-Tests.bambda

Repeat the request with HTTP headers often used to spoof the client IP like X-Client-IP, X-Forwarded-For etc to check for IP restriction bypasses.

Screenshot

Capture

JS-Functions-Analysis.bambda

Highlight HTTP responses containing potentially dangerous JS Functions in the HTTP history

Screenshot

[ToDo]

ParamHighlighter.bambda

Highlight HTTP requests containing parameters that are often vulnerable to SSRF (Yellow), SQLi (Red), XSS (Blue), LFI (Orange), Open Redirect (Green) and RCE (White)

Screenshot

image

URL-match-and-replace.bambda

Match any HTTPS URLs in requests and replace them by a burp collaborator payload.

Screenshot

image

API-Spec-Overview.bambda

Analyze selected Swagger/OpenAPI specification with AI to give some hints based on the OWASP API top 10.

Screenshot

image