Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack
The extension checks the following things:
- Application response bodies for specific strings that indicate a vulnerability is present, such as error output indicative of SQLi, Serialization issues, XXE issues, etc, and
- Application requests in the URL and Body for potential targets of SSRF/LFI/RFI/Directory Traversal/URL Injection attack.
- Application requests and responses in URLs, bodies, and headers for AWS S3 buckets/Azure Storage containers/Google storage containers.
- Application requests for parameters that might indicate targets for other common attack vectors (similar to HUNT).
- Application responses for potential leaking of secrets.
All you have to do is add the JAR as an extension in Burp, add the targets to your scope in which you want to identify issues, and then it will monitor all Burp traffic.
Continue adding and improving the matches as well as add a tab to create your own.