Status: MVP (pre-release). Tested on macOS with Burp Suite Pro/Community and Java 17. THC4M3 is a minimal Burp extension that helps you test thick-client apps without drowning in noise: label/annotate only the traffic you care about, and generate a quick PAC file.
- Events table that logs/labels interesting requests & responses
- Allow-lists for Host (regex), Port (CSV), MIME (regex)
- Show/annotate only matching traffic to reduce noise
- PAC generator to route only your target domains via Burp
- Checklist sub-tab for thick-client test setup (save/load/export)
No telemetry. Everything runs inside Burp.
- Download the latest
thc4m3.jarfrom Releases. - In Burp: Extensions → Installed → Add → Java and select the JAR.
- Confirm the THC4M3 tab appears.
If you’re on macOS and running Burp from a mounted .dmg, copy it to
/Applicationsfirst.
If HTTPS fails due to TLS interception, install Burp’s CA certificate in your OS trust store or usecurl -kduring smoke tests.
- In the THC4M3 tab, set:
- Host allow (regex): e.g.
.*(api|login|auth|gateway).*|localhost|127\.0\.0\.1 - Port allow (comma):
80,443,8080,8443 - MIME allow (regex):
^(application/json|application/xml|text/.*|application/octet-stream)$
- Host allow (regex): e.g.
- Click Apply Filters.
- (Optional) Click Generate PAC… and use it in your app/OS to only proxy target hosts via Burp.
curl --proxy http://127.0.0.1:8080 -k https://postman-echo.com/get -I
curl --proxy http://127.0.0.1:8080 -k https://postman-echo.com/post
-H "Content-Type: application/json" --data '{"hello":"world"}'
A thin, practical list for thick-client setup (pinning, TLS suites, IPC/local endpoints, file I/O caches/logs/secrets, etc.). Use Save / Load / Export… to persist or share checklists for a project.
Requires Java 17 and Gradle Wrapper (included).
./gradlew clean jar
unzip -p build/libs/thc4m3.jar META-INF/MANIFEST.MF | grep Burp-Extender-Class
Extension loads but no tab: Ensure you launched Burp from /Applications (macOS app sandbox prompts can block access when run from a DMG).
HTTPS failures: Install Burp CA into your OS keychain, or use -k only for quick tests.
No events appear: Confirm your Host/Port/MIME allow-lists match, then generate a PAC or point your app to the Burp proxy.
Backfill labeling from Proxy history
Export/Import of all settings
Status chip / counters
Richer checklist with WSTG mappings