Skip to content

Commit eaca0fd

Browse files
committed
Moved python version to legacy folder, updated readmes
1 parent 030728f commit eaca0fd

File tree

6 files changed

+165
-153
lines changed

6 files changed

+165
-153
lines changed

BurpFeed.exe

-6.01 MB
Binary file not shown.

LegacyPythonBurpFeed/README.md

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
# BurpFeed
2+
**-- This is the legacy implementaion and is no longer supported therefore it is recommended that you use the go version --**
3+
![](https://github.com/ZephrFish/BurpFeed/blob/master/LogoBurpFeed.png)
4+
5+
A tool for passing and adding a list of URLs to Burp's sitemap/target tab, really useful for populating the targets tab with a big list of URLs. Originally an idea that [@InfoSecPS](https://twitter.com/InfoSecPS) and I threw together, then I tweaked and hacked together this chaos!
6+
7+
The tool is written in both Python and Go, GoBurpFeed was written by [Mantis](https://github.com/MantisSTS) while the python version has been a collaboration between ZephrFish, InfosecPS and Mantis.
8+
9+
10+
## BurpFeed Setup
11+
To set this up, you'll need the following:
12+
- Burp Suite
13+
- FLOW Burp Extension (https://github.com/hvqzao/burp-flow), also available on BApps store :-)
14+
- Python3 & Pip
15+
- `pip install -r requirements.txt`
16+
17+
Chuck your target URLs or IPs in a file, can be named whatever but must have http/https prefixed at the start of line for this to work. Additionally you'll want to edit line 15 (example below), depending on what the IP of your burp proxy is. Either done via localhost or if in a Virtual Machine feed the listening address of burp (you'll need to flip the proxy interface to listening on all interfaces).
18+
19+
```
20+
proxy = {
21+
"http": "http://localhost:8080",
22+
"https": "https://localhost:8080",
23+
}
24+
```
25+
26+
When you've got all of this setup you can refer to usage.
27+
28+
29+
### Usage:
30+
```
31+
python bfeed.py targets.txt
32+
```
33+
34+
To igrnore warnings you can supress them with this:
35+
36+
```
37+
python -W ignore bfeed.py targets.txt
38+
```
39+
40+
This will probably throw errors but alas it's a hacky tool 😉
Original file line numberDiff line numberDiff line change
@@ -1,71 +1,71 @@
1-
#!/env/python3
2-
# Burp URL Feeder Threaded
3-
# ZephrFish & Mantis 2022
4-
# Python 3 Conversion
5-
6-
import urllib3
7-
import sys
8-
import re
9-
import requests
10-
import argparse
11-
from requests.packages.urllib3.exceptions import InsecureRequestWarning
12-
from multiprocessing import Pool
13-
14-
urllib3.exceptions.InsecureRequestWarning
15-
16-
version = "2.2"
17-
18-
def printBanner():
19-
print(""""
20-
__________ ___________ .___
21-
\______ \__ _______________\_ _____/___ ____ __| _/
22-
| | _/ | \_ __ \____ \| __)/ __ \_/ __ \ / __ |
23-
| | \ | /| | \/ |_> > \\ ___/\ ___// /_/ |
24-
|______ /____/ |__| | __/\___ / \___ >\___ >____ |
25-
\/ |__| \/ \/ \/ \/
26-
Version {0}""".format(version)
27-
sleep(1)
28-
29-
def fetchUrl(url):
30-
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
31-
32-
# Change me to whatever you want, can be IP of host or localhost wherever Burp is listening
33-
proxy = {
34-
"http": "http://localhost:8080",
35-
"https": "https://localhost:8080",
36-
}
37-
38-
headers = sys.argv[2]
39-
40-
regex=re.compile('^http://|^https://')
41-
if re.match(regex, url):
42-
try:
43-
normalresponse = requests.get(url.rstrip(), proxies=proxy, verify=False, timeout=8, headers=headers)
44-
print("URL: {0} | Status: {1}".format(url.rstrip(), normalresponse.status_code))
45-
except:
46-
pass
47-
else:
48-
HTTPSecure = "https://"+url.rstrip()
49-
HTTPNot = "http://"+url.rstrip()
50-
try:
51-
httpsresponse = requests.get(HTTPSecure, proxies=proxy, verify=False, timeout=8, headers=headers)
52-
httpresponse = requests.get(HTTPNot, proxies=proxy, verify=False, timeout=8, headers=headers)
53-
print("URL: {0} | Status: {1}".format(HTTPNot, httpresponse.status_code))
54-
print("URL: {0} | Status: {1}".format(HTTPSecure, httpsresponse.status_code))
55-
56-
except:
57-
pass
58-
59-
def burpFeed(urls, threads):
60-
pool = Pool(int(threads))
61-
with open(urls, encoding="utf8") as source_file:
62-
results = pool.map(fetchUrl, source_file, int(threads))
63-
print(results)
64-
65-
if __name__ == '__main__':
66-
try:
67-
burpFeed(sys.argv[1], sys.argv[2])
68-
except:
69-
print("Not enough arguments! %s <hosts file> <headers>" % sys.argv[0])
70-
sys.exit()
71-
1+
#!/env/python3
2+
# Burp URL Feeder Threaded
3+
# ZephrFish & Mantis 2022
4+
# Python 3 Conversion
5+
6+
import urllib3
7+
import sys
8+
import re
9+
import requests
10+
import argparse
11+
from requests.packages.urllib3.exceptions import InsecureRequestWarning
12+
from multiprocessing import Pool
13+
14+
urllib3.exceptions.InsecureRequestWarning
15+
16+
version = "2.2"
17+
18+
def printBanner():
19+
print(""""
20+
__________ ___________ .___
21+
\______ \__ _______________\_ _____/___ ____ __| _/
22+
| | _/ | \_ __ \____ \| __)/ __ \_/ __ \ / __ |
23+
| | \ | /| | \/ |_> > \\ ___/\ ___// /_/ |
24+
|______ /____/ |__| | __/\___ / \___ >\___ >____ |
25+
\/ |__| \/ \/ \/ \/
26+
Version {0}""".format(version)
27+
sleep(1)
28+
29+
def fetchUrl(url):
30+
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
31+
32+
# Change me to whatever you want, can be IP of host or localhost wherever Burp is listening
33+
proxy = {
34+
"http": "http://localhost:8080",
35+
"https": "https://localhost:8080",
36+
}
37+
38+
headers = sys.argv[2]
39+
40+
regex=re.compile('^http://|^https://')
41+
if re.match(regex, url):
42+
try:
43+
normalresponse = requests.get(url.rstrip(), proxies=proxy, verify=False, timeout=8, headers=headers)
44+
print("URL: {0} | Status: {1}".format(url.rstrip(), normalresponse.status_code))
45+
except:
46+
pass
47+
else:
48+
HTTPSecure = "https://"+url.rstrip()
49+
HTTPNot = "http://"+url.rstrip()
50+
try:
51+
httpsresponse = requests.get(HTTPSecure, proxies=proxy, verify=False, timeout=8, headers=headers)
52+
httpresponse = requests.get(HTTPNot, proxies=proxy, verify=False, timeout=8, headers=headers)
53+
print("URL: {0} | Status: {1}".format(HTTPNot, httpresponse.status_code))
54+
print("URL: {0} | Status: {1}".format(HTTPSecure, httpsresponse.status_code))
55+
56+
except:
57+
pass
58+
59+
def burpFeed(urls, threads):
60+
pool = Pool(int(threads))
61+
with open(urls, encoding="utf8") as source_file:
62+
results = pool.map(fetchUrl, source_file, int(threads))
63+
print(results)
64+
65+
if __name__ == '__main__':
66+
try:
67+
burpFeed(sys.argv[1], sys.argv[2])
68+
except:
69+
print("Not enough arguments! %s <hosts file> <headers>" % sys.argv[0])
70+
sys.exit()
71+
+48-48
Original file line numberDiff line numberDiff line change
@@ -1,48 +1,48 @@
1-
#!/env/python
2-
# Burp URL Feeder Non-Threaded
3-
# ZephrFish 2.1 2021
4-
import urllib3
5-
import sys
6-
import re
7-
import requests
8-
import argparse
9-
10-
urllib3.exceptions.InsecureRequestWarning
11-
12-
13-
def burpFeed(urls):
14-
proxy = {
15-
16-
"http": "http://127.0.0.1:8080",
17-
"https": "https://127.0.0.1:8080",
18-
}
19-
20-
headers = sys.argv[2]
21-
22-
with open(urls.rstrip(), 'r') as f:
23-
for url in f:
24-
regex=re.compile('^http://|^https://')
25-
if re.match(regex, url):
26-
try:
27-
normalresponse = requests.get(url.rstrip(), proxies=proxy, verify=False, timeout=8)
28-
print(url, normalresponse.status_code)
29-
except:
30-
pass
31-
else:
32-
HTTPSecure = "https://"+url.rstrip()
33-
HTTPNot = "http://"+url.rstrip()
34-
try:
35-
httpsresponse = requests.get(HTTPSecure, proxies=proxy, verify=False, timeout=8)
36-
httpresponse = requests.get(HTTPNot, proxies=proxy, verify=False, timeout=8)
37-
print(url.rstrip(), httpsresponse.status_code, httpresponse.status_code)
38-
except:
39-
pass
40-
41-
42-
if __name__ == '__main__':
43-
try:
44-
burpFeed(sys.argv[1])
45-
except:
46-
print("File argument needed! %s <hosts file>" % sys.argv[0])
47-
sys.exit()
48-
1+
#!/env/python
2+
# Burp URL Feeder Non-Threaded
3+
# ZephrFish 2.1 2021
4+
import urllib3
5+
import sys
6+
import re
7+
import requests
8+
import argparse
9+
10+
urllib3.exceptions.InsecureRequestWarning
11+
12+
13+
def burpFeed(urls):
14+
proxy = {
15+
16+
"http": "http://127.0.0.1:8080",
17+
"https": "https://127.0.0.1:8080",
18+
}
19+
20+
headers = sys.argv[2]
21+
22+
with open(urls.rstrip(), 'r') as f:
23+
for url in f:
24+
regex=re.compile('^http://|^https://')
25+
if re.match(regex, url):
26+
try:
27+
normalresponse = requests.get(url.rstrip(), proxies=proxy, verify=False, timeout=8)
28+
print(url, normalresponse.status_code)
29+
except:
30+
pass
31+
else:
32+
HTTPSecure = "https://"+url.rstrip()
33+
HTTPNot = "http://"+url.rstrip()
34+
try:
35+
httpsresponse = requests.get(HTTPSecure, proxies=proxy, verify=False, timeout=8)
36+
httpresponse = requests.get(HTTPNot, proxies=proxy, verify=False, timeout=8)
37+
print(url.rstrip(), httpsresponse.status_code, httpresponse.status_code)
38+
except:
39+
pass
40+
41+
42+
if __name__ == '__main__':
43+
try:
44+
burpFeed(sys.argv[1])
45+
except:
46+
print("File argument needed! %s <hosts file>" % sys.argv[0])
47+
sys.exit()
48+
File renamed without changes.

README.md

+6-34
Original file line numberDiff line numberDiff line change
@@ -3,48 +3,20 @@
33

44
A tool for passing and adding a list of URLs to Burp's sitemap/target tab, really useful for populating the targets tab with a big list of URLs. Originally an idea that [@InfoSecPS](https://twitter.com/InfoSecPS) and I threw together, then I tweaked and hacked together this chaos!
55

6-
The tool is written in both Python and Go, GoBurpFeed was written by [Mantis](https://github.com/MantisSTS) while the python version has been a collaboration between ZephrFish, InfosecPS and Mantis.
6+
The tool is written in both Python and Go, GoBurpFeed was written by [Mantis](https://github.com/MantisSTS) and ZephrFish while the python version has been a collaboration between ZephrFish, InfosecPS and Mantis.
77

8-
9-
## BurpFeed Setup
10-
To set this up, you'll need the following:
11-
- Burp Suite
12-
- FLOW Burp Extension (https://github.com/hvqzao/burp-flow), also available on BApps store :-)
13-
- Python3 & Pip
14-
- `pip install -r requirements.txt`
15-
16-
Chuck your target URLs or IPs in a file, can be named whatever but must have http/https prefixed at the start of line for this to work. Additionally you'll want to edit line 15 (example below), depending on what the IP of your burp proxy is. Either done via localhost or if in a Virtual Machine feed the listening address of burp (you'll need to flip the proxy interface to listening on all interfaces).
17-
18-
```
19-
proxy = {
20-
"http": "http://localhost:8080",
21-
"https": "https://localhost:8080",
22-
}
23-
```
24-
25-
When you've got all of this setup you can refer to usage.
26-
27-
28-
### Usage:
29-
```
30-
python bfeed.py targets.txt
31-
```
32-
33-
To igrnore warnings you can supress them with this:
34-
35-
```
36-
python -W ignore bfeed.py targets.txt
37-
```
38-
39-
This will probably throw errors but alas it's a hacky tool 😉
8+
GoBurpFeed will be the only supported version from now on as the python version has been migrated to a legacy state.
409

4110
## GoBurpFeed
4211
![](https://raw.githubusercontent.com/egonelbre/gophers/ac77b513f41f44a7805694063aaef16ccd95a9b3/vector/projects/network.svg)
4312

4413
A tool for passing and adding a list of URLs to Burp's sitemap/target tab, really useful for populating the targets tab with a big list of URLs.
4514

4615
### GoBurpFeed Setup
47-
16+
To set this up, you'll need the following:
17+
- Burp Suite
18+
- FLOW Burp Extension (https://github.com/hvqzao/burp-flow), also available on BApps store :-)
19+
- GO Binary either downloaded or build from easy install below.
4820
#### Install
4921

5022
```

0 commit comments

Comments
 (0)