Installation
Prerequisites
Before using this plugin, ensure you have:Burp Suite Professional
Required for project file support. Community edition does not support .burp project files.
burpsuite-project-file-parser extension
Install the extension from GitHub
When to Use
Use this plugin when you need to:- Search response headers or bodies using regex patterns
- Extract security audit findings and vulnerabilities
- Dump proxy history or site map data for analysis
- Programmatically analyze HTTP traffic captured by Burp Suite
Commands
/burp-search
Search and extract data from Burp Suite project files.Path to .burp project file
Operation to perform:
auditItems, proxyHistory, siteMap, responseHeader='regex', responseBody='regex'Available Operations
auditItems
auditItems
Extract all security findings from Burp Scanner.Output: JSON with name, severity, confidence, host, port, protocol, url
proxyHistory
proxyHistory
Dump all captured HTTP traffic from the proxy.Output: Complete request/response data
siteMap
siteMap
Dump all site map entries.Output: Site structure with all discovered endpoints
responseHeader
responseHeader
Search response headers using regex patterns.Output: JSON with url and matching header
responseBody
responseBody
Search response bodies using regex patterns.Output: Matching content from response bodies
Sub-Component Filters
For large projects, filter to specific data to improve performance:siteMap.*
Examples
- Security Findings
- CORS Headers
- Server Signatures
- Request URLs
- HTML Forms
Extract all high-severity findings:
Output Format
All output is JSON, one object per line. Pipe tojq for formatting or use grep for filtering:
How It Works
Burp Extension Integration
The plugin uses the burpsuite-project-file-parser extension to access project file data
Command-line Access
Runs Burp Suite in headless mode via the bundled JRE to execute search operations
Environment Variables
Override default paths if needed:Path to Java executable (default: Burp’s bundled JRE)
Path to burpsuite_pro.jar
Default Paths
- macOS
- Linux
Use Cases
Vulnerability Triage
Quickly extract and prioritize security findings by severity and confidence
Pattern Analysis
Search for specific patterns across all captured HTTP traffic
Attack Surface Mapping
Export site map data to understand application structure
Report Generation
Extract data for automated security report generation
Tips
All regex patterns must be properly quoted when passed as command-line arguments. Use single quotes around the entire operation string.