Skip to content

lockenkoepflein/CODIBurp

Repository files navigation

Burp Suite Extension "CODIBurp"

Description

A content discovery extension for Burp Suite – automating the discovery of hidden directories and files on web servers to identify potential security vulnerabilities.

Installation/Setup

  1. Install Burp Suite Community Edition:
    Download Burp Suite Community Edition - PortSwigger

  2. Download Jython standalone jar file:
    Downloads | Jython
    (under Jython Standalone); it is the file in the format "jython-standalone-X.X.X.jar."

  3. Start Burp Suite:
    Screenshot1
    Screenshot2

  4. Configure settings in Burp Suite under Extensions:
    Screenshot3
    Here, enter the Jython Standalone JAR file and, if necessary, the path for the extension in the respective fields.

  5. Download the CODIBurp.py file from the GitHub repository:
    CODIBurp/CODIBurp.py at main · lockenkoepflein/CODIBurp · GitHub
    Save the file in the directory specified in the "Folder for loading modules" field.

  6. In Burp Suite, click the "Add" button under "Extensions":
    Screenshot4

    • Extension type: Select Python.
    • For Extension file, choose the downloaded .py file.
    • Then, click the "Next" button.
      Screenshot5

    The extension will now be loaded into Burp Suite, and the tool's GUI should appear.
    If there are issues with loading, they will be displayed under "Errors":
    Screenshot6

Usage

GUI with a short description:
Screenshot7

After configuring and starting the brute force process with the "Start" button, the current progress can be seen on the progress bar:
Screenshot8

The following lists (but also others) can be used for the brute force process:

Note that the URLs should point to a list where each new line contains a file or directory name.

Once the brute force process is completed based on the configured lists, the "Save Results" button becomes active, and the following message appears under "Progress":
Screenshot9

Switching to the "Results" tab will list the found files and directories (only results with the desired status codes will be displayed):
Screenshot10

Clicking the "Save Results" button will create a .txt file in the directory where the .py file is located. This file will contain the found directories and files:
Screenshot11

License

The project is available under the MIT license. See the LICENSE file.