Burp Suite contains various tools for performing different testing tasks.
The tools operate effectively together, and you can pass interesting
requests between tools as your work progresses, to carry out different
Use the links below to read the detailed help on each of the individual
- Target - This tool
contains detailed information about your target applications, and lets
you drive the process of testing for vulnerabilities.
- Proxy - This is an intercepting
proxy that operates as a man-in-the-middle between the end browser
and the target web application. It lets you intercept, inspect and modify
the raw traffic passing in both directions.
- Spider - This is an intelligent application-aware
web spider that can crawl an application to locate its content
[Pro version] - This is an advanced web
vulnerability scanner, which can automatically discover numerous types
- Intruder - This is a
tool for carrying out automated customized attacks against web applications.
It is highly configurable and can be used to perform a wide range of
tasks to make your testing faster and more effective.
- Repeater - This is a
simple tool for manually
manipulating and reissuing individual HTTP requests, and analyzing the
- Sequencer - This is a
sophisticated tool for
analyzing the quality of randomness in an application's session tokens
or other important data items that are intended to be unpredictable.
- Decoder - This is a
useful tool for performing
manual or intelligent decoding and encoding of application data.
- Comparer - This is a
handy utility for
performing a visual "diff" between any two items of data, such
as pairs of similar HTTP messages.
- Extender - This lets
you load Burp extensions, to extend Burp's functionality using your own
or third-party code.
Monday, October 19, 2015
This release updates Burp to include a security fix in the BlazeDS library that Burp uses for parsing AMF messages, and disables AMF support by default.
Burp's cookie jar has been updated to support the cookie path attribute.
The functions to save and restore state now include options for handling the unique identifier that Burp uses to track interactions with Burp Collaborator.
See all release notes ›