01Offline analysis of captured HTTP traffic patterns
02Command-line exploration of .burp project files
03Bulk dumping of proxy history and site map data
048 GitHub stars
05Automated extraction of security audit findings and evidence
06Regex-based searching across HTTP response headers and bodies