npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2025 – Pkg Stats / Ryan Hefner

burp-control

v0.5.1

Published

A command-line interface for controlling burp suite

Downloads

39

Readme

BurpControl

BurpControl is a tool for automating security vulnerability scans with Burp Suite Professional

Introduction

BurpControl, in conjunction with Burp Suite Professional, provides the following features:

  • Run a Burp site crawl in headless or GUI mode
  • Run a Burp vulnerability scan in headless or GUI mode
  • Configure in and out-of-scope URL(s) for Burp's crawler and scanner
  • Use externals UI or API tests to extend Burp's target sitemap
  • Generate a scan report in HTML/XML format.
  • Generate a JUnit report that breaks the build in case a vulnerability is discovered
  • Shut down Burp

Prerequisites

Setup

  1. Setup Burp Professional 1.x and configure a valid license
  2. Build and install Burp REST API Extension
  3. Create a configuration (JSON) for the target application.

Running Burp with the REST API Extension

On Windows/Linux:

java -jar -Xmx2G burp-rest-api-1.0.3.jar \
--headless.mode=false \
--burp.jar=burpsuite_pro_v1.7.37.jar \
--burp.ext=burp-retire-js-3.jar \
--config-file=burp-default-project-options.json \
--user-config-file=burp-user-options.json

BurpControl can also start up Burp in the background with the command 'burpctl start'.

BurpControl Configuration

{
  "burpApiJar": "burp-rest-api-2.0.1.jar",
  "burpJar": "burpsuite_pro_v1.7.37.jar",
  "burpExtensions": [ "burp-retire-js-3.jar"],
  "burpOptions": [
    "-Xmx1024M"
  ],
  "headless": false,
  "proxyUrl": "localhost:8080",
  "apiUrl": "http://localhost:8090",
  "reportType": "HTLM",
  "crawlTargets": [
    "https://targetapp.herokuapp.com" 
  ],
  "scanTargets": [
    "https://targetapp.herokuapp.com/api"
  ],
  "targetScope": {
    "include": [ "https://targetapp.herokuapp.com" ],
    "exclude": [ "http://github.com" ]
  }
}

Command-line options

  Usage: burpctl [options] [command]

  Options:

    -V, --version              output the version number
    -h, --help                 output usage information

  Commands:

    crawl [config]             Crawl using the specified config file
    scan [options] [config]    Scan using the specified config file
    report [options] [config]  Generate a report using the specified config file
    junit [options] [config]   Generate a junit report using the specified config file  
    start [config]             Start Burp Suite using the specified config file
    stop [config]              Stop Burp Suite using the specified config file
    status [config]            Return the Burp Suite status using the specified config file

Typical workflow

  1. Create a BurpControl config.json file containing the URL(s) of the target application.

  2. Start up Burp with the API Extension

    burpctl start
  3. Crawl the application by running

    burpctl crawl
  4. Optionally run UI tests or an UI crawler (e.g., puppeteer tests using Burp as a proxy).

  5. Actively scan the application by running

    burpctl scan
  6. Generate a report with

    burpctl report
  7. Generate a junit report with

    burpctl junit
  8. Shut down Burp Suite

    burpctl stop