Getting Started with Burp Suite
Burp Suite Documentation
Take a look at our Documentation section for full details about every Burp Suite tool, function and configuration option.
Burp Suite Professional and Community editions | Burp Suite Enterprise Edition |
Burp Scanner | Burp Collaborator |
Burp Infiltrator | Full Documentation Contents |
Burp Extender
Burp Extender lets you extend the functionality of Burp Suite in numerous ways.
Extensions can be written in Java, Python or Ruby.
API documentation | Writing your first Burp Suite extension |
Sample extensions | View community discussions about Extensibility |
disable Payload encoding and auto load payloads through API
It would be nice if the payloads get automatically loaded from custom file when invoking sendToIntruder method and API method to disable URL encode these characters through API. Thereby launching the attack through API
It’s in our roadmap to provide an API to allow extensions to configure the details of Intruder attacks and launch them programmatically. We can’t currently provide an ETA for this feature, sorry.
If you want to repeat an attack numerous times using the same payload list on a different base request template, you can use the Option at Intruder menu / New tab behavior / Copy configuration from first tab, and then configure your payloads and other settings once in the first tab. They will be copied to each newly created tab.
In our testing, the option to URL-encode payloads is being copied from the first tab to a newly created tab, if you have enabled the “Copy configuration from first tab” option.
My question is that simple list paylad tab cannot paste unicode words like Chinese '毛泽东',it woud be nice if add a unicode url encoding functionality to %e6%af%9b%e6%b3%bd%e4%b8%9c。you can refer http://tool.chinaz.com/tools/urlencode.aspx,thanks ,burp suite is the greatest http fuzz tools !