Burp Suite CLI tools and key workflows for web application security testing.
java -jar burpsuite_community.jar
java -jar -Xmx2g burpsuite_pro.jar
java -jar burpsuite_pro.jar --project-file=project.burp
java -jar burpsuite_pro.jar --config-file=config.json
curl -x http://127.0.0.1:8080 http://target.com/api/endpoint
curl -x http://127.0.0.1:8080 -k https://target.com/api
export http_proxy=http://127.0.0.1:8080; export https_proxy=http://127.0.0.1:8080
python3 script.py --proxy http://127.0.0.1:8080
# Sniper — single payload position cycled through wordlist
# Battering Ram — same payload in ALL positions simultaneously
# Pitchfork — different wordlists per position, paired rows
# Cluster Bomb — all combinations of all wordlists
# Ctrl+R — Send request to Repeater
# Ctrl+I — Send request to Intruder
# Ctrl+Shift+U — URL decode selected text
# Ctrl+Shift+B — Base64 encode selected text
burp scan --project-file=project.burp --url=http://target.com
# Right-click request → Scan → Active Scan
# Dashboard → New Scan → URL-based scan
# Logger++ — Advanced logging and search across all requests
# Autorize — Detect authorization/IDOR issues automatically
# JWT Editor — Decode, modify, attack JWT tokens
# Param Miner — Discover hidden/unlinked parameters
# Active Scan++ — Enhanced active scanning checks
# CORS* — Detect CORS misconfigurations
# Hackvertor — Encodings/transforms with tags in requests
# Upload Scanner — Test file upload vulnerabilities