


Inspector - This provides some useful features for analyzing and editing HTTP and WebSockets messages.Logger - This is a tool for recording and analyzing HTTP traffic that Burp Suite generates.Comparer - This is a handy utility for performing a visual "diff" between any two items of data, such as pairs of similar HTTP messages.Decoder - This is a useful tool for performing manual or automated decoding and encoding of application data.Sequencer - This is a sophisticated tool for analyzing the quality of randomness in an application's session tokens or other important data items that are intended to be unpredictable.Repeater - This is a tool for manually manipulating and resending individual messages, and analyzing the application's responses.It is highly configurable and can be used to perform a wide range of tasks to make your testing faster and more effective.

Intruder - This is a powerful tool for carrying out automated customized attacks against web applications.This is an advanced web vulnerability scanner, which can automatically crawl content and audit for numerous types of vulnerabilities. It lets you intercept, inspect and modify the raw traffic passing in both directions. Proxy - This is an intercepting web proxy that operates as a man-in-the-middle between the end browser and the target web application.Burp's browser - This browser is preconfigured to work with the full functionality of Burp Suite right out of the box.Target - This tool contains detailed information about your target applications, and lets you drive the process of testing for vulnerabilities.Managing application logins using the configuration library.Spoofing your IP address using Burp Proxy match and replace.Testing for reflected XSS using Burp Repeater.Viewing requests sent by Burp extensions using Logger.Resending individual requests with Burp Repeater.Augmenting manual testing using Burp Scanner.Intercepting HTTP requests and responses.Viewing requests sent by Burp extensions.Testing for SQL injection vulnerabilities.Testing for parameter-based access control.Identifying which parts of a token impact the response.Search Professional and Community Edition
