Quick Fuzzer is a Burp Suite Bambda script for Custom Repeater Action that lets you instantly fuzz parameter insertion points with a basic set of payloads — without needing a to leave repeater tab.
- To learn bambda script development.
- During lots of my application security engagments, client asks me not to perform automatic scann and intruder fuzzing but still they want to manually cover common payloads. This is the solution for such scenarios where I can automate my small manual payload testing with one click solution.
- Sends a small list of fuzzing payloads - You can add/remove yours payloads.
- Fast, scriptable, and useful for quick checks during manual testing.
- Modify as Per Need - Add/remove payloads and checks as per requirements
- You can modify the delay between requests as well.
quick-fuzz-setup.mp4
2025-06-27.21-34-13.mp4
- Clone this repo.
- Open Burp Suite.
- Navigate to Extender → Bambda Scripts.
- Click "Load", select
quick-fuzzer.bambda
. - Set Location as
Custom Action
andRepeater
, see the video - Select a request in Repeater context.
- Run the script to send all payloads and view responses.
quick-fuzz-add-delay.mp4
quick-fuzz-add-remove-payloads.mp4
- SQLI
- XSS
- SSTI
- JSON Injection
- LDAP Injection
- Path Traversal
- NOSQLI
- Command Injection
- Special Character Allowed or Not
- String Format Payloads
- Business Logic Payloads
- Input Length
- Invalid Emails
- Invalid Date
- Invalid Time
- Negative Values
- Empty Values
You can customize or extend the payload list directly in the script.
You can add/remove attacks types as well, i.e commenting out the payloads for invalid date will not perform that check.
When you can run scan and fuzz, comment out the technical payloads and quickly test for non-technical payloads like invalid emails.
Note: This is not replacement of intruder/scanner, it is just a custom action for repeater to solve very specific issue of automation of manual test cases. Read the script before running and check if it matches your use case.
It is not new ground breaking tool or anything like that.