burp-suite
Burp Suite Professional
Burp Suite Professional is an HTTP interception proxy with numerous security testing features. It allows you to view and manipulate the HTTP requests and responses flowing between a client (usually a web application loaded in a browser) and a server.
With the increased traffic of today's websites, Burp stands out for its ability to handle parallel requests. Its interactive tools allow you to formulate and test hypotheses about how the site will behave, even when there is a lot of traffic to sort through—a feat that is difficult for most browser development tools. In addition, Burp includes advanced search and filtering mechanisms that greatly increase user productivity when dealing with high traffic. Burp's UI also significantly outperforms browser development tools when it comes to editing requests.
When to Use
Use Burp Suite when:
- Testing web applications for security vulnerabilities during audits
- Identifying server-side issues and unexpected behaviors
- Identifying client-side vulnerabilities (with DOM Invader extension)
- Understanding data flow between client and server in obfuscated applications
- Fuzzing multiple query parameters or header values simultaneously
- Testing applications under different scenarios (geographical locations, user preferences)
Consider alternatives when:
- You need fully automated scanning without manual interaction → Consider OWASP ZAP
- Testing mobile applications that don't use HTTP/HTTPS → Consider mobile-specific tools
More from trailofbits/skills
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts arise.
4.2Ksemgrep
>-
3.8Kmodern-python
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
3.8Kcodeql
>-
3.6Kinsecure-defaults
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.
3.5Ksecure-workflow-guide
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
3.4K