Skip to content

A Burp Suite extension that exposes proxy traffic through a REST API for real-time inspection and automation workflows.

Notifications You must be signed in to change notification settings

SdxShadow/Fast-Traffic-Exposer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Fast Traffic Exposer

A Burp Suite extension that exposes proxy traffic through a REST API for real-time inspection and automation workflows.

Features

  • 📦 Captures and exposes the latest 50 intercepted packets
  • 🔌 REST API endpoint (localhost:11443) for external tool integration
  • 📊 Returns both request and response data in JSON format
  • 🖱️ Burp Suite context menu shortcuts for manual traffic export
  • ⚡ Automatic loading of existing proxy history on startup
  • 📈 Total request counter across all captured traffic

Quick Start

  1. Run ./build.sh to build the extension
  2. Load LiveTraffic.jar via Burp Suite → Extender → Add
  3. The extension automatically starts listening on http://127.0.0.1:11443
  4. Query the API endpoint to retrieve captured traffic data

Build

./build.sh

This will:

  • Compile BurpExtender.java
  • Create LiveTraffic.jar in the current directory

API Usage

Endpoint

GET http://127.0.0.1:11443

Response Format

{
  "count": 150,
  "traffic": [
    {
      "url": "https://example.com/api/data",
      "method": "GET",
      "status_code": "200",
      "request_raw": "GET /api/data HTTP/1.1\r\nHost: example.com\r\n...",
      "response_raw": "HTTP/1.1 200 OK\r\nContent-Type: application/json\r\n..."
    }
  ]
}

Fields:

  • count: Total number of requests processed since extension loaded
  • traffic: Array of the most recent 50 intercepted requests/responses
  • url: Full URL of the request
  • method: HTTP method (GET, POST, etc.)
  • status_code: HTTP response status code
  • request_raw: Complete raw HTTP request
  • response_raw: Complete raw HTTP response (text-based content only, binary data omitted)

Example Queries

Retrieve all captured traffic:

curl http://127.0.0.1:11443

Parse JSON and count entries:

curl -s http://127.0.0.1:11443 | jq '.traffic | length'

Extract all URLs:

curl -s http://127.0.0.1:11443 | jq '.traffic[].url'

Filter by status code:

curl -s http://127.0.0.1:11443 | jq '.traffic[] | select(.status_code == "200")'

Context Menu Usage

Right-click on any request in Burp Suite (Proxy, Target, etc.) and select "Send to API" to manually add selected request(s) to the exposed traffic history. This is useful for:

  • Highlighting specific requests for external tool analysis
  • Manual traffic curation
  • Testing API integrations

Requirements

  • Burp Suite (Professional or Community Edition)
  • Java 8 or higher
  • burp-extender-api.jar (included in repository)

Troubleshooting

Port already in use:

  • Ensure no other process is using port 11443
  • Check with: lsof -i :11443 (macOS/Linux) or netstat -ano | findstr :11443 (Windows)

Extension not loading:

  • Verify Java version: java -version
  • Check Burp Suite Extender errors tab for detailed error messages
  • Ensure LiveTraffic.jar was built successfully

No traffic appearing:

  • Ensure proxy interception is enabled in Burp Suite
  • Traffic only appears after responses are received
  • The extension captures the last 50 requests automatically

Repository

GitHub: SdxShadow/Fast-Traffic-Exposer

About

A Burp Suite extension that exposes proxy traffic through a REST API for real-time inspection and automation workflows.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published