DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Tool

Burp Beautifier

Reading Time: 2 mins read
in Software, Tool

BurpBeautifier is a Burpsuite extension for beautifying request/response body, supporting JS, JSON, HTML, XML format, writing in Jython 2.7.

Features

  • Supporting Format
    • JS: use jsbeautify module
    • JSON: use jsbeautify module
    • HTML: use beautifulsoup4 module, and jsbeautify module for js code in HTML
    • XML: use xml module
  • Writing in Jython, modify source code conveniently. eg: Modify the beautify function to change how to beautify.
  • Beautify and replace response body.
  • Option setting persistence.
  • Send Request/Response body to Beautifier Panel

Notice

  • It may modify data, such as: beautifying xml will add the <?xml version=”1.0″ encoding=”UTF-8″?> header, beautifying html will repair html tag.
  • Assuming the request/response body is utf-8, so if the body is not utf8 encoding or compatible with utf8, it may not work well.
  • Not considering gzip/deflate compress/decompress, so need the Proxy->Options->Miscellaneous->Unpack gzip/deflate in response is enabled (ON by default)

Limitations

  • Jython is slow. So It will not beautify if size excess dataMaxSize(default is 680KB)
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.

VISIT SOURCE

Tags: Burp SuiteLinuxPenTestingtool of the dayVM
ADVERTISEMENT

Related Posts

OWASP Dependency-Check Tool

OWASP Dependency-Check Tool

May 2, 2023
Cisco Meraki – SaaS Tool

Cisco Meraki – SaaS Tool

April 23, 2023
BeachheadSecure – SaaS Tool

BeachheadSecure – SaaS Tool

April 23, 2023
Jamf Now – SaaS Tool

Jamf Now – SaaS Tool

April 23, 2023

More Articles

Incidents

Washington residents’ medical data exposed by phishing attack

March 25, 2022
Podcast

The K-12 Tech Experience – Podcast

April 26, 2022
Alerts

Cybercrime Group TA558 Targeting Hospitality, Hotel, and Travel Organizations

August 19, 2022
Alerts

CVE-2020-17022 | Microsoft Windows Codecs Library Remote Code Execution Vulnerability

October 19, 2020

LockBit 3.0 malware forced NHS supplier to shut down sites

October 14, 2022
Incidents

Medical school exposes personal data of thousands of students

November 3, 2021
Alerts

FBI Releases Indicators of Compromise Associated with Hive Ransomware

August 27, 2021
Definition

Mosaic Regressor

October 13, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.