A comprehensive Burp Suite extension for vulnerability management, path monitoring, and audit tracking during penetration testing. This extension streamlines the vulnerability discovery and documentation process with advanced project management capabilities.
- CWE Classification - Mark vulnerabilities with 15+ CWE categories (SQL Injection, XSS, Command Injection, etc.)
- Dual Interface - CWE Tracker tab for quick marking + traditional right-click context menu
- Request-specific View - See all vulnerabilities for the current request instantly
- Advanced Filtering - Filter vulnerabilities by CWE type for focused analysis
- Multiple Export Formats - Export to JSON, CSV, or plain text for reporting
- Duplicate Prevention - Automatic detection and prevention of duplicate vulnerability entries
- Timestamp Tracking - Complete audit trail with vulnerability discovery timestamps
- Multi-Project Support - Manage separate vulnerability databases for different engagements
- Project Switching - Quick switching between projects with automatic data isolation
- Data Persistence - Automatic saving with JSON-based database storage
- Project Statistics - Real-time statistics showing vulnerability counts and audit progress
- Data Migration - Easy migration of data between projects and file locations
- Smart Watch Lists - Monitor specific endpoints with audit status tracking
- Pattern Matching - Support for wildcards and regex patterns in path matching
- Auto-Highlighting - Automatic request highlighting in Proxy, Scanner, and Spider
- Audit Status Tracking - Mark paths as audited manually or automatically
- Bulk Operations - Mark all paths as audited, clear lists, import/export functionality
- Progress Tracking - Visual progress indicators showing audit completion status
- Automated Import - Import endpoints directly from Burp's Target sitemap
- Advanced Filtering - Exclude by file extensions, MIME types, or custom patterns
- MIME Type Detection - Intelligent MIME type filtering with preset configurations
- Live Monitoring - Real-time monitoring of sitemap changes with automatic updates
- Target Selection - Choose specific hosts/scopes for endpoint import
- Batch Processing - Process large sitemaps efficiently with filtering options
- Auto-Audit Settings - Automatically mark paths as audited when accessed via Repeater/Scanner
- Configurable Monitoring - Adjustable sitemap monitoring frequency (Fast/Normal/Slow)
- Preset Filters - Pre-configured MIME type filters for static assets and API responses
- Flexible Configuration - Comprehensive settings dialog for all extension features
- Import/Export Settings - Save and restore configuration across different environments
-
Download the Extension
- Download
vuln_tracker.py
from this repository
- Download
-
Load in Burp Suite
- Go to
Extender
โExtensions
- Click
Add
- Select
Python
as extension type - Select the
vuln_tracker.py
file - Click
Next
and thenClose
- Go to
-
Verify Installation
- Look for the "Vuln tracker" tab in the main Burp interface
- The extension will automatically create a default project on first run
- The extension automatically creates a default project on first run
- Access project management via the
Projects
button in the main interface - Switch between projects or create new ones as needed for different engagements
- Navigate to any request in Repeater, Proxy History, or Target
- Click the "Vuln Tracker" tab (appears next to Pretty/Raw/Hex)
- Select a CWE type from the dropdown menu
- Click "Mark Vulnerability" to record the finding
- View request-specific vulnerabilities in the same tab
- Right-click any request in Proxy History, Target, or Repeater
- Select "Mark as Vulnerable"
- Choose the appropriate CWE type
- View all vulnerabilities in the main "Vulnerabilities" tab
- Navigate to the "Watch List" tab in the main interface
- Add paths manually using the text area or "Add Path" button
- Import from sitemap using the "Import from Sitemap" button
- Configure auto-highlighting and audit tracking options
- Mark paths as audited as you complete testing
- Click "Import from Sitemap" in the Watch List tab
- Select target hosts and configure filtering options
- Set MIME type exclusions (e.g., images, CSS, JS)
- Enable auto-monitoring for real-time sitemap updates
- Import filtered endpoints directly to your watch list
- Click the "Configure" button for advanced settings
- Set auto-audit preferences for Repeater/Scanner integration
- Configure sitemap monitoring frequency and filters
- Export/import settings for team collaboration
The extension supports comprehensive vulnerability classification with the following CWE types:
- CWE-22 - Path Traversal
- CWE-78 - OS Command Injection
- CWE-79 - Cross-Site Scripting (XSS)
- CWE-89 - SQL Injection
- CWE-90 - LDAP Injection
- CWE-91 - XML Injection
- CWE-94 - Code Injection
- CWE-95 - Dynamic Code Evaluation
- CWE-98 - File Inclusion
- CWE-200 - Information Disclosure
- CWE-284 - Access Control Issues
- CWE-287 - Authentication Bypass
- CWE-352 - Cross-Site Request Forgery
- CWE-434 - File Upload Issues
- CWE-601 - Open Redirect
- CWE-862 - Missing Authorization
Complete vulnerability data with metadata:
{
"1": {
"cwe": "CWE-89",
"description": "SQL Injection",
"url": "https://example.com/api/users",
"method": "POST",
"timestamp": "2025-01-15 14:30:22",
"request_hash": "abc123"
}
}
Structured data for spreadsheet analysis:
CWE,Description,Method,URL,Timestamp,Request_Hash
CWE-89,SQL Injection,POST,https://example.com/api/users,2025-01-15 14:30:22,abc123
Simple URL list for tools integration:
https://example.com/api/users
https://example.com/admin/panel
- Wildcard Support: Use
*
for flexible path matching/api/*/users
matches/api/v1/users
,/api/v2/users
/admin/*
matches any path starting with/admin/
- Regex Support: Advanced pattern matching for complex scenarios
- Substring Matching: Simple contains-based matching for convenience
- Repeater Integration: Automatically mark paths as audited when tested in Repeater
- Scanner Integration: Mark paths as audited when scanned by Burp Scanner
- Visual Feedback: Real-time notifications when auto-audit triggers
- Configurable: Enable/disable auto-audit per tool
- Intelligent Detection: Uses Burp's MIME type detection
- Preset Configurations:
- Static Assets (CSS, JS, Images)
- API Responses (JSON, XML)
- Custom Exclusions: Define your own MIME type filters
- Content-Type Fallback: Secondary detection via HTTP headers
- Separate Databases: Each project maintains independent vulnerability data
- Quick Switching: Change projects without losing context
- Data Portability: Export/import project data between environments
- Backup Support: Automatic data persistence with manual backup options
- Extension not loading: Ensure Python support is enabled in Burp
- Data not persisting: Check file permissions in the extension directory
- Slow performance: Reduce sitemap monitoring frequency in settings
- Missing vulnerabilities: Verify project selection and data file location
- Limit watch list size: Large watch lists can impact performance
- Use specific patterns: Avoid overly broad wildcard patterns
- Regular cleanup: Remove completed/irrelevant projects periodically
- Monitor memory usage: Large vulnerability datasets may require more memory