01Command-line dumping of proxy history and site map data
02Integration with security audit and variant analysis workflows
03Automated extraction of security audit findings from project files
04Regex searching across HTTP response headers and bodies
052 GitHub stars
06Direct analysis of captured HTTP traffic in .burp files