Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
JGillam authored Dec 28, 2018
1 parent 8d2c84a commit b07cce3
Showing 1 changed file with 2 additions and 5 deletions.
7 changes: 2 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,8 @@
## Description
The purpose of this extension is to improve efficiency of manual parameter analysis for web penetration tests of either complex or numerous applications. This can assist in tasks such as identifying sensitive data, identifying hash algorithms, decoding parameters, and determining which parameters are reflected in the response.

This extension performs an in-depth and intelligent parameter analysis of all in-scope Burp traffic. Results are displayed in an interactive table and can be sent directly to other Burp tools such as Repeater.
## Docs

## Usage
Burp Paramalyzer is an extension for the popular Burp Suite web penetration testing tool by Portswigger. To use it, simply set your scope within Burp and map out the application by using it (clicking through links and filling out forms). The goal of mapping should be to generate "normal" user traffic rather than attack payloads. Once this is done click on the correlator tab and perform analysis. The results will be displayed in an interactive table.

For a video demo see: https://www.youtube.com/watch?v=jn1hd-LkSuw
[Read the docs](http://jgillam.github.io/burp-paramalyzer/)

_Note: You must install Burp Suite (either the community or pro version) first. Then download the latest burp-paramalyzer release (.jar file) and install it through the Burp Extender tab._

0 comments on commit b07cce3

Please sign in to comment.