If this project helps your work, support ongoing maintenance and new features.
ETH Donation Wallet
0x11282eE5726B3370c8B480e321b3B2aA13686582
Scan the QR code or copy the wallet address above.
Burp Suite extension for browsing, copying, and exporting scan findings.
- Penetration Testing Reports: Quickly copy findings into report templates with full technical details
- Bug Bounty Hunting: Export structured vulnerability data with HTTP evidence for submissions
- Security Research: Organize and track findings across multiple targets with status flags
- Team Collaboration: Share standardized JSON exports with complete request/response data
- Vulnerability Management: Track testing progress with Tested/Exploited/False Positive markers
- Automation & Integration: Use JSON exports with curl commands and Python templates for validation
- Time Savings: One-click copy eliminates manual formatting of vulnerability details
- Complete Context: Every export includes full HTTP evidence, not just summaries
- Smart Deduplication: Automatically identifies unique vs duplicate findings across hosts
- Persistent Tracking: Status flags survive Burp restarts for long-term project management
- Ready-to-Use: Exports include working curl commands and Python scripts for immediate testing
- Visual Clarity: Color-coded UI with alternating rows makes scanning hundreds of findings effortless
- No Manual Copying: Double-click to copy complete vulnerability details to clipboard
- HTTP Evidence Included: Full request/response pairs with headers and bodies
- Executable Exports: curl commands and Python scripts ready to run
- Status Persistence: Track your testing workflow across sessions
- Duplicate Intelligence: Instantly see which findings are unique vs repeated
- Organized Exports: Structured by severity/confidence with statistics and test scripts
- Burp → Extender → Extensions → Add → Python
- Select:
CopyIssues.py - Click severity/confidence filter (e.g., "High - Certain")
- Double-click any issue to copy to clipboard
- Paste into your preferred tool or documentation
- Burp Suite (Professional or Community Edition)
- Jython Standalone JAR (https://www.jython.org/download)
Interactive UI extension for browsing, copying, and exporting scan findings.
Features:
- Filter by severity (High/Medium) and confidence (Certain/Firm/Tentative)
- Advanced filtering by host/path/issue-type regex, status, and unique-only mode
- Saved filter presets (save/apply/delete)
- Color-coded buttons with brightness gradients
- Alternating row backgrounds for readability
- Double-click to copy full issue details to clipboard
- Multi-select bulk actions (bulk tested/exploited/FP/clear + copy selected)
- Per-issue analyst notes with persistence
- Copied issues turn light green until refresh
- Refresh button to reload current filter
- Background export with live status and
Cancel Exportsupport - Export profiles: Evidence, Quick, Submission, Dev Ticket
- Status tracking with checkboxes (Tested/Exploited/False Positive)
- Duplicate highlighting - unique issues show [UNIQUE] in bold green on right
- Group-by-host headers are non-actionable rows (copy/status actions stay issue-safe)
- Export all issues to JSON with full HTTP evidence
Usage:
- Click severity/confidence filter → Double-click issue → Copy to clipboard
- Use checkboxes for single-issue status, or use bulk buttons for multi-select updates
- Save commonly used views with presets (host/path/type regex + status + unique-only + grouping)
- Add analyst notes per issue with Save Note / Clear Note
- Click "Refresh" to reload findings
- Choose export profile, then click "Export All" (use "Cancel Export" to stop)
~/burp_exports/scan_TIMESTAMP/ (or C:\burp_exports\ on Windows)
├── stats.json
├── README.txt
├── test.sh (or test.bat on Windows)
├── High/
│ ├── certain.json
│ ├── firm.json
│ └── tentative.json
└── Medium/
├── certain.json
├── firm.json
└── tentative.json
Each issue includes:
- id - MD5 hash for deduplication
- timestamp - Scan session timestamp
- severity/confidence - Risk level and detection confidence
- host/url/protocol/port - Target metadata
- finding - Vulnerability name
- description/background/remediation - Full details
- insertion_points - Vulnerable parameters (URL/Body/Cookie)
- http_evidence - Complete request/response pairs with headers/bodies
- base_request - Full request details with query_params, cookies, headers
- curl_command - Ready-to-use curl command
- python_request_template - Working Python script with requests library
- Tested: Mark issues you've manually tested
- Exploited: Mark successfully exploited vulnerabilities
- False Positive: Mark issues that are false positives
- Clear: Remove all status flags for selected issue
- Status persists across Burp restarts
Issues are grouped by host + vulnerability type:
- [UNIQUE] marker appears on right for single occurrences
- Duplicates have no marker
- Helps prioritize unique attack vectors
Displays all High and Medium severity issues detected by Burp Scanner, including but not limited to:
- SQL injection, XSS, Code/Command injection
- Path traversal, XXE, SSRF, Deserialization
- Authentication bypass, CSRF, CORS
- File upload, Template injection
- Host header attacks, Open redirect
- LDAP injection, HTTP smuggling
- And any other High/Medium severity findings from Burp's scanner
- Deduplication: MD5 hash of host+URL+issue_name
- Encoding: UTF-8 handling for non-ASCII characters
- Truncation: Request/response bodies limited to 5KB
- Filtering: Only High and Medium severity issues
- UI Colors:
- Severity buttons: Dark → light gradients (Certain → Tentative)
- Copied rows: Light green background
- Unique issues: Bold green [UNIQUE] marker on right
- Status Persistence: Saved to
~/burp_exports/issue_status.json(orC:\burp_exports\on Windows) - Notes Persistence: Saved to
~/burp_exports/issue_notes.json(orC:\burp_exports\on Windows) - Preset Persistence: Saved to
~/burp_exports/filter_presets.json(orC:\burp_exports\on Windows) - Cross-platform: Works on Windows, Linux, and macOS
- Count Refresh: Background count refresh every 15s + scanner-listener cache invalidation
- Performance: Async issue loading/export, prompt generation on-demand, and export limited to first 2 HTTP messages per issue with 20 headers max
- Export Profiles:
Evidence: full technical evidence payloadQuick: lightweight triage payloadSubmission: sanitized report-oriented payloadDev Ticket: developer handoff payload with repro details
Developed by Teycir Ben Soltane
MIT License - Free to use for authorized security testing and research purposes.



