Skip to content

This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used to create custom wordlists for directory/dns/parameter brute-forcing.

License

Notifications You must be signed in to change notification settings

ldcvanderpoel/Burp-Wordlist-Generator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Burp-Wordlist-Generator

Generates wordlists from the Burp sitemap.

Everyone in offensive cyber security (pentesting/bug bounty) uses the same wordlists (SecLists, WFuzz, Assetnode, etc.). Creating your own custom wordlists is necessary to differentiate yourself from hordes of automated scanners. This Burp extension extracts various kinds of data (path, parameter keys, parameter values, subdomains, etc.) from the Burp sitemap and stores this in respective wordlist files. These wordlists can then be used for directory/dns/parameter brute-forcing.

Good to know

  • Currently, the following types of data are collected:

    • Paths
    • Subdomains
    • Parameter keys
    • Parameter values
    • Parameter key-value pairs (query)
  • Data is only collected from the following parameter types. Parameters from cookies, multipart forms, and XML attributes are ignored.

    • URL
    • Body
    • JSON
    • XML
  • Only in-scope data is collected.

  • Only unique entries are stored (per project).

  • Either select the entire sitemap, only process the selected endpoints.

Installation

Inside Burp, go to Extender, select Add, set 'Extension type' to Python, and select the extension file.

Usage

Go to the 'Target' tab and right-click the sitemap.

Output can be seen by visiting the extension tab.

The wordlists are written to: <extension dir>/wordlists/<Burp project name>.

Further processing

After creating different wordlists, they can be aggregated:

cat wordlists/*/paths.txt | sort | uniq
cat wordlists/*/keys.txt | sort | uniq
cat wordlists/*/values.txt | sort | uniq
cat wordlists/*/queries.txt | sort | uniq
cat wordlists/*/subdomains.txt | sort | uniq

At one point, an option for this may be added to the extension.

A word of warning

The generated wordlists can contain sensitive data such as usernames, password, and tokens. Review the wordlist before launching it against other systems.

About

This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used to create custom wordlists for directory/dns/parameter brute-forcing.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages