{"id":"ad9124cf-0130-4366-8d50-a303f3c28e3a","shortId":"urJF7F","kind":"skill","title":"burp-suite-testing","tagline":"Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows.","description":"> AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments.\n\n# Burp Suite Web Application Testing\n\n## Purpose\n\nExecute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows. This skill enables systematic discovery and exploitation of web application vulnerabilities through proxy-based testing methodology.\n\n## Inputs / Prerequisites\n\n### Required Tools\n- Burp Suite Community or Professional Edition installed\n- Burp's embedded browser or configured external browser\n- Target web application URL\n- Valid credentials for authenticated testing (if applicable)\n\n### Environment Setup\n- Burp Suite launched with temporary or named project\n- Proxy listener active on 127.0.0.1:8080 (default)\n- Browser configured to use Burp proxy (or use Burp's browser)\n- CA certificate installed for HTTPS interception\n\n### Editions Comparison\n| Feature | Community | Professional |\n|---------|-----------|--------------|\n| Proxy | ✓ | ✓ |\n| Repeater | ✓ | ✓ |\n| Intruder | Limited | Full |\n| Scanner | ✗ | ✓ |\n| Extensions | ✓ | ✓ |\n\n## Outputs / Deliverables\n\n### Primary Outputs\n- Intercepted and modified HTTP requests/responses\n- Vulnerability scan reports with remediation advice\n- HTTP history and site map documentation\n- Proof-of-concept exploits for identified vulnerabilities\n\n## Core Workflow\n\n### Phase 1: Intercepting HTTP Traffic\n\n#### Launch Burp's Browser\nNavigate to integrated browser for seamless proxy integration:\n\n1. Open Burp Suite and create/open project\n2. Go to **Proxy > Intercept** tab\n3. Click **Open Browser** to launch preconfigured browser\n4. Position windows to view both Burp and browser simultaneously\n\n#### Configure Interception\nControl which requests are captured:\n\n```\nProxy > Intercept > Intercept is on/off toggle\n\nWhen ON: Requests pause for review/modification\nWhen OFF: Requests pass through, logged to history\n```\n\n#### Intercept and Forward Requests\nProcess intercepted traffic:\n\n1. Set intercept toggle to **Intercept on**\n2. Navigate to target URL in browser\n3. Observe request held in Proxy > Intercept tab\n4. Review request contents (headers, parameters, body)\n5. Click **Forward** to send request to server\n6. Continue forwarding subsequent requests until page loads\n\n#### View HTTP History\nAccess complete traffic log:\n\n1. Go to **Proxy > HTTP history** tab\n2. Click any entry to view full request/response\n3. Sort by clicking column headers (# for chronological order)\n4. Use filters to focus on relevant traffic\n\n### Phase 2: Modifying Requests\n\n#### Intercept and Modify\nChange request parameters before forwarding:\n\n1. Enable interception: **Intercept on**\n2. Trigger target request in browser\n3. Locate parameter to modify in intercepted request\n4. Edit value directly in request editor\n5. Click **Forward** to send modified request\n\n#### Common Modification Targets\n| Target | Example | Purpose |\n|--------|---------|---------|\n| Price parameters | `price=1` | Test business logic |\n| User IDs | `userId=admin` | Test access control |\n| Quantity values | `qty=-1` | Test input validation |\n| Hidden fields | `isAdmin=true` | Test privilege escalation |\n\n#### Example: Price Manipulation\n\n```http\nPOST /cart HTTP/1.1\nHost: target.com\nContent-Type: application/x-www-form-urlencoded\n\nproductId=1&quantity=1&price=100\n\n# Modify to:\nproductId=1&quantity=1&price=1\n```\n\nResult: Item added to cart at modified price.\n\n### Phase 3: Setting Target Scope\n\n#### Define Scope\nFocus testing on specific target:\n\n1. Go to **Target > Site map**\n2. Right-click target host in left panel\n3. Select **Add to scope**\n4. When prompted, click **Yes** to exclude out-of-scope traffic\n\n#### Filter by Scope\nRemove noise from HTTP history:\n\n1. Click display filter above HTTP history\n2. Select **Show only in-scope items**\n3. History now shows only target site traffic\n\n#### Scope Benefits\n- Reduces clutter from third-party requests\n- Prevents accidental testing of out-of-scope sites\n- Improves scanning efficiency\n- Creates cleaner reports\n\n### Phase 4: Using Burp Repeater\n\n#### Send Request to Repeater\nPrepare request for manual testing:\n\n1. Identify interesting request in HTTP history\n2. Right-click request and select **Send to Repeater**\n3. Go to **Repeater** tab to access request\n\n#### Modify and Resend\nTest different inputs efficiently:\n\n```\n1. View request in Repeater tab\n2. Modify parameter values\n3. Click Send to submit request\n4. Review response in right panel\n5. Use navigation arrows to review request history\n```\n\n#### Repeater Testing Workflow\n\n```\nOriginal Request:\nGET /product?productId=1 HTTP/1.1\n\nTest 1: productId=2    → Valid product response\nTest 2: productId=999  → Not Found response  \nTest 3: productId='    → Error/exception response\nTest 4: productId=1 OR 1=1 → SQL injection test\n```\n\n#### Analyze Responses\nLook for indicators of vulnerabilities:\n\n- Error messages revealing stack traces\n- Framework/version information disclosure\n- Different response lengths indicating logic flaws\n- Timing differences suggesting blind injection\n- Unexpected data in responses\n\n### Phase 5: Running Automated Scans\n\n#### Launch New Scan\nInitiate vulnerability scanning (Professional only):\n\n1. Go to **Dashboard** tab\n2. Click **New scan**\n3. Enter target URL in **URLs to scan** field\n4. Configure scan settings\n\n#### Scan Configuration Options\n\n| Mode | Description | Duration |\n|------|-------------|----------|\n| Lightweight | High-level overview | ~15 minutes |\n| Fast | Quick vulnerability check | ~30 minutes |\n| Balanced | Standard comprehensive scan | ~1-2 hours |\n| Deep | Thorough testing | Several hours |\n\n#### Monitor Scan Progress\nTrack scanning activity:\n\n1. View task status in **Dashboard**\n2. Watch **Target > Site map** update in real-time\n3. Check **Issues** tab for discovered vulnerabilities\n\n#### Review Identified Issues\nAnalyze scan findings:\n\n1. Select scan task in Dashboard\n2. Go to **Issues** tab\n3. Click issue to view:\n   - **Advisory**: Description and remediation\n   - **Request**: Triggering HTTP request\n   - **Response**: Server response showing vulnerability\n\n### Phase 6: Intruder Attacks\n\n#### Configure Intruder\nSet up automated attack:\n\n1. Send request to Intruder (right-click > Send to Intruder)\n2. Go to **Intruder** tab\n3. Define payload positions using § markers\n4. Select attack type\n\n#### Attack Types\n\n| Type | Description | Use Case |\n|------|-------------|----------|\n| Sniper | Single position, iterate payloads | Fuzzing one parameter |\n| Battering ram | Same payload all positions | Credential testing |\n| Pitchfork | Parallel payload iteration | Username:password pairs |\n| Cluster bomb | All payload combinations | Full brute force |\n\n#### Configure Payloads\n\n```\nPositions Tab:\nPOST /login HTTP/1.1\n...\nusername=§admin§&password=§password§\n\nPayloads Tab:\nSet 1: admin, user, test, guest\nSet 2: password, 123456, admin, letmein\n```\n\n#### Analyze Results\nReview attack output:\n\n- Sort by response length to find anomalies\n- Filter by status code for successful attempts\n- Use grep to search for specific strings\n- Export results for documentation\n\n## Quick Reference\n\n### Keyboard Shortcuts\n| Action | Windows/Linux | macOS |\n|--------|---------------|-------|\n| Forward request | Ctrl+F | Cmd+F |\n| Drop request | Ctrl+D | Cmd+D |\n| Send to Repeater | Ctrl+R | Cmd+R |\n| Send to Intruder | Ctrl+I | Cmd+I |\n| Toggle intercept | Ctrl+T | Cmd+T |\n\n### Common Testing Payloads\n\n```\n# SQL Injection\n' OR '1'='1\n' OR '1'='1'--\n1 UNION SELECT NULL--\n\n# XSS\n<script>alert(1)</script>\n\"><img src=x onerror=alert(1)>\njavascript:alert(1)\n\n# Path Traversal\n../../../etc/passwd\n..\\..\\..\\..\\windows\\win.ini\n\n# Command Injection\n; ls -la\n| cat /etc/passwd\n`whoami`\n```\n\n### Request Modification Tips\n- Right-click for context menu options\n- Use decoder for encoding/decoding\n- Compare requests using Comparer tool\n- Save interesting requests to project\n\n## Constraints and Guardrails\n\n### Operational Boundaries\n- Test only authorized applications\n- Configure scope to prevent accidental out-of-scope testing\n- Rate-limit scans to avoid denial of service\n- Document all findings and actions\n\n### Technical Limitations\n- Community Edition lacks automated scanner\n- Some sites may block proxy traffic\n- HSTS/certificate pinning may require additional configuration\n- Heavy scanning may trigger WAF blocks\n\n### Best Practices\n- Always set target scope before extensive testing\n- Use Burp's browser for reliable interception\n- Save project regularly to preserve work\n- Review scan results manually for false positives\n\n## Examples\n\n### Example 1: Business Logic Testing\n\n**Scenario**: E-commerce price manipulation\n\n1. Add item to cart normally, intercept request\n2. Identify `price=9999` parameter in POST body\n3. Modify to `price=1`\n4. Forward request\n5. Complete checkout at manipulated price\n\n**Finding**: Server trusts client-provided price values.\n\n### Example 2: Authentication Bypass\n\n**Scenario**: Testing login form\n\n1. Submit valid credentials, capture request in Repeater\n2. Send to Repeater for testing\n3. Try: `username=admin' OR '1'='1'--`\n4. Observe successful login response\n\n**Finding**: SQL injection in authentication.\n\n### Example 3: Information Disclosure\n\n**Scenario**: Error-based information gathering\n\n1. Navigate to product page, observe `productId` parameter\n2. Send request to Repeater\n3. Change `productId=1` to `productId=test`\n4. Observe verbose error revealing framework version\n\n**Finding**: Apache Struts 2.5.12 disclosed in stack trace.\n\n## Troubleshooting\n\n### Browser Not Connecting Through Proxy\n- Verify proxy listener is active (Proxy > Options)\n- Check browser proxy settings point to 127.0.0.1:8080\n- Ensure no firewall blocking local connections\n- Use Burp's embedded browser for reliable setup\n\n### HTTPS Interception Failing\n- Install Burp CA certificate in browser/system\n- Navigate to http://burp to download certificate\n- Add certificate to trusted roots\n- Restart browser after installation\n\n### Slow Performance\n- Limit scope to reduce processing\n- Disable unnecessary extensions\n- Increase Java heap size in startup options\n- Close unused Burp tabs and features\n\n### Requests Not Being Intercepted\n- Verify \"Intercept on\" is enabled\n- Check intercept rules aren't filtering target\n- Ensure browser is using Burp proxy\n- Verify target isn't using unsupported protocol\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["burp","suite","testing","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding"],"capabilities":["skill","source-sickn33","skill-burp-suite-testing","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/burp-suite-testing","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34882 github stars · SKILL.md body (10,662 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-24T12:50:42.631Z","embedding":null,"createdAt":"2026-04-18T21:33:51.076Z","updatedAt":"2026-04-24T12:50:42.631Z","lastSeenAt":"2026-04-24T12:50:42.631Z","tsv":"'-1':444 '-2':793 '/../../etc/passwd':1058 '/cart':460 '/etc/passwd':1066 '/login':942 '/product':671 '1':211,227,292,344,388,430,469,471,477,479,481,502,542,603,635,673,676,697,699,700,747,792,806,835,874,951,1037,1038,1040,1041,1042,1052,1055,1181,1191,1211,1237,1256,1257,1278,1294 '100':473 '123456':959 '127.0.0.1':147,1332 '15':780 '2':234,299,351,377,393,508,549,610,641,678,683,752,812,841,885,957,1199,1230,1245,1286 '2.5.12':1308 '3':240,306,359,399,491,517,557,620,645,690,756,822,846,890,1207,1251,1269,1291 '30':786 '4':248,314,368,407,522,590,651,695,765,896,1212,1258,1298 '5':321,414,657,735,1215 '6':329,865 '8080':148,1333 '999':685 '9999':1202 'access':340,439,626 'accident':575,1105 'action':996,1124,1436 'activ':145,805,1323 'ad':484 'add':519,1192,1363 'addit':1142 'admin':437,945,952,960,1254 'advic':193 'advisori':851 'alert':1051,1054 'alway':1152 'analysi':24,76 'analyz':704,832,962 'anomali':973 'apach':1306 'applic':8,54,60,95,124,132,1100,1430 'application/x-www-form-urlencoded':467 'aren':1407 'arrow':660 'assess':44 'attack':867,873,898,900,965 'attempt':980 'authent':129,1231,1267 'author':34,42,1099 'autom':27,79,737,872,1130 'avoid':1116 'balanc':788 'base':100,1275 'batter':914 'benefit':566 'best':1150 'blind':728 'block':1135,1149,1337 'bodi':320,1206 'bomb':930 'boundari':1096 'browser':117,121,150,160,218,222,243,247,256,305,398,1162,1314,1327,1344,1369,1412 'browser/system':1356 'brute':935 'burp':2,12,51,64,107,114,135,154,158,216,229,254,592,1160,1341,1352,1359,1391,1415 'burp-suite-test':1 'busi':432,1182 'bypass':1232 'ca':161,1353 'captur':264,1241 'cart':486,1195 'case':905 'cat':1065 'certif':162,1354,1362,1364 'chang':383,1292 'check':785,823,1326,1404 'checkout':1217 'chronolog':366 'cleaner':587 'click':241,322,352,362,415,511,525,543,613,646,753,847,881,1073 'client':1225 'client-provid':1224 'close':1389 'cluster':929 'clutter':568 'cmd':1003,1009,1016,1023,1029 'code':977 'column':363 'combin':933 'command':1061 'commerc':1188 'common':421,1031 'communiti':109,170,1127 'compar':1082,1085 'comparison':168 'complet':341,1216 'comprehens':6,58,790 'concept':203 'configur':119,151,258,766,770,868,937,1101,1143 'connect':1316,1339 'constraint':1092 'content':317,465 'content-typ':464 'context':1075 'continu':330 'control':48,260,440 'core':208 'creat':586 'create/open':232 'credenti':127,920,1240 'ctrl':1001,1007,1014,1021,1027 'd':1008,1010 'dashboard':750,811,840 'data':731 'decod':1079 'deep':795 'default':149 'defens':45 'defin':495,891 'deliver':180 'denial':1117 'describ':1437 'descript':773,852,903 'differ':632,719,726 'direct':410 'disabl':1379 'disclos':1309 'disclosur':718,1271 'discov':827 'discoveri':90 'display':544 'document':199,991,1120 'download':1361 'drop':1005 'durat':774 'e':1187 'e-commerc':1186 'edit':112,167,408,1128 'editor':413 'educ':49 'effici':585,634 'embed':116,1343 'enabl':88,389,1403 'encoding/decoding':1081 'ensur':1334,1411 'enter':757 'entri':354 'environ':50,133 'error':711,1274,1301 'error-bas':1273 'error/exception':692 'escal':454 'exampl':425,455,1179,1180,1229,1268 'exclud':528 'execut':5,57,1432 'exploit':92,204 'export':988 'extens':178,1157,1381 'extern':120 'f':1002,1004 'fail':1350 'fals':1177 'fast':782 'featur':169,1394 'field':449,764 'filter':370,534,545,974,1409 'find':834,972,1122,1221,1263,1305 'firewal':1336 'flaw':724 'focus':372,497 'forc':936 'form':1236 'forward':287,323,331,387,416,999,1213 'found':687 'framework':1303 'framework/version':716 'full':176,357,934 'fuzz':911 'gather':1277 'get':670 'go':235,345,503,621,748,842,886 'grep':982 'guardrail':1094 'guest':955 'header':318,364 'heap':1384 'heavi':1144 'held':309 'hidden':448 'high':777 'high-level':776 'histori':195,284,339,349,541,548,558,609,664 'host':462,513 'hour':794,799 'hsts/certificate':1138 'http':18,70,186,194,213,338,348,458,540,547,608,857 'http/1.1':461,674,943 'https':165,1348 'id':435 'identifi':206,604,830,1200 'img':1047 'improv':583 'in-scop':553 'includ':17,69 'increas':1382 'indic':708,722 'inform':717,1270,1276 'initi':742 'inject':702,729,1035,1062,1265 'input':103,446,633 'instal':113,163,1351,1371 'integr':15,67,221,226 'intercept':20,72,166,183,212,238,259,266,267,285,290,294,297,312,380,390,391,405,1026,1165,1197,1349,1398,1400,1405 'interest':605,1088 'intrud':174,866,869,878,884,888,1020 'isadmin':450 'isn':1419 'issu':824,831,844,848 'item':483,556,1193 'iter':909,925 'java':1383 'javascript':1053 'keyboard':994 'la':1064 'lack':1129 'launch':137,215,245,739 'left':515 'length':721,970 'letmein':961 'level':778 'lightweight':775 'limit':175,1113,1126,1374 'listen':144,1321 'load':336 'local':1338 'locat':400 'log':282,343 'logic':433,723,1183 'login':1235,1261 'look':706 'ls':1063 'maco':998 'manipul':457,1190,1219 'manual':31,83,601,1175 'map':198,507,816 'marker':895 'may':1134,1140,1146 'menu':1076 'messag':712 'methodolog':102 'minut':781,787 'mode':772 'modif':22,74,422,1069 'modifi':185,378,382,403,419,474,488,628,642,1208 'monitor':800 'name':141 'navig':219,300,659,1279,1357 'new':740,754 'nois':538 'normal':1196 'null':1045 'observ':307,1259,1283,1299 'on/off':269 'one':912 'onerror':1050 'open':228,242 'oper':1095 'option':771,1077,1325,1388 'order':367 'origin':668 'out-of-scop':529,578,1106 'output':179,182,966 'overview':779,1440 'page':335,1282 'pair':928 'panel':516,656 'parallel':923 'paramet':319,385,401,428,643,913,1203,1285 'parti':572 'pass':280 'password':927,946,947,958 'path':1056 'paus':274 'payload':892,910,917,924,932,938,948,1033 'perform':1373 'phase':210,376,490,589,734,864 'pin':1139 'pitchfork':922 'point':1330 'posit':249,893,908,919,939,1178 'post':459,941,1205 'practic':1151 'preconfigur':246 'prepar':598 'prerequisit':104 'preserv':1170 'prevent':574,1104 'price':427,429,456,472,480,489,1189,1201,1210,1220,1227 'primari':181 'privileg':453 'process':289,1378 'product':680,1281 'productid':468,476,672,677,684,691,696,1284,1293,1296 'profession':111,171,745 'progress':802 'project':142,233,1091,1167 'prompt':524 'proof':201 'proof-of-concept':200 'protocol':1423 'provid':1226 'proxi':99,143,155,172,225,237,265,311,347,1136,1318,1320,1324,1328,1416 'proxy-bas':98 'purpos':56,426 'qti':443 'quantiti':441,470,478 'quick':783,992 'r':1015,1017 'ram':915 'rate':1112 'rate-limit':1111 'real':820 'real-tim':819 'reduc':567,1377 'refer':993 'regular':1168 'relev':374 'reliabl':1164,1346 'remedi':192,854 'remov':537 'repeat':173,593,597,619,623,639,665,1013,1244,1248,1290 'replay':26,78 'report':190,588 'request':23,75,262,273,279,288,308,316,326,333,379,384,396,406,412,420,573,595,599,606,614,627,637,650,663,669,855,858,876,1000,1006,1068,1083,1089,1198,1214,1242,1288,1395 'request/response':358 'requests/responses':187 'requir':105,1141 'resend':630 'respons':653,681,688,693,705,720,733,859,861,969,1262 'restart':1368 'result':482,963,989,1174 'reveal':713,1302 'review':315,652,662,829,964,1172 'review/modification':276 'right':510,612,655,880,1072 'right-click':509,611,879,1071 'root':1367 'rule':1406 'run':736 'save':1087,1166 'scan':29,81,189,584,738,741,744,755,763,767,769,791,801,804,833,837,1114,1145,1173 'scanner':177,1131 'scenario':1185,1233,1272 'scope':494,496,521,532,536,555,565,581,1102,1109,1155,1375 'seamless':224 'search':984 'secur':9,43,61 'select':518,550,616,836,897,1044 'send':325,418,594,617,647,875,882,1011,1018,1246,1287 'server':328,860,1222 'servic':1119 'set':293,492,768,870,950,956,1153,1329 'setup':134,1347 'sever':798 'shortcut':995 'show':551,560,862 'simultan':257 'singl':907 'site':197,506,563,582,815,1133 'size':1385 'skill':39,87,1428 'skill-burp-suite-testing' 'slow':1372 'sniper':906 'sort':360,967 'source-sickn33' 'specif':500,986 'sql':701,1034,1264 'src':1048 'stack':714,1311 'standard':789 'startup':1387 'status':809,976 'string':987 'strut':1307 'submit':649,1238 'subsequ':332 'success':979,1260 'suggest':727 'suit':3,13,52,65,108,136,230 'systemat':89 'tab':239,313,350,624,640,751,825,845,889,940,949,1392 'target':122,302,395,423,424,493,501,505,512,562,758,814,1154,1410,1418 'target.com':463 'task':808,838 'technic':1125 'temporari':139 'test':4,10,32,55,62,84,101,130,431,438,445,452,498,576,602,631,666,675,682,689,694,703,797,921,954,1032,1097,1110,1158,1184,1234,1250,1297 'third':571 'third-parti':570 'thorough':796 'time':725,821 'tip':1070 'toggl':270,295,1025 'tool':106,1086 'toolset':16,68 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'trace':715,1312 'track':803 'traffic':19,71,214,291,342,375,533,564,1137 'travers':1057 'tri':1252 'trigger':394,856,1147 'troubleshoot':1313 'true':451 'trust':1223,1366 'type':466,899,901,902 'unexpect':730 'union':1043 'unnecessari':1380 'unsupport':1422 'unus':1390 'updat':817 'url':125,303,759,761 'use':11,35,37,63,153,157,369,591,658,894,904,981,1078,1084,1159,1340,1414,1421,1426 'user':434,953 'userid':436 'usernam':926,944,1253 'valid':46,126,447,679,1239 'valu':409,442,644,1228 'verbos':1300 'verifi':1319,1399,1417 'version':1304 'view':252,337,356,636,807,850 'vulner':28,80,96,188,207,710,743,784,828,863 'waf':1148 'watch':813 'web':7,53,59,94,123 'whoami':1067 'win.ini':1060 'window':250,1059 'windows/linux':997 'work':1171 'workflow':33,85,209,667,1434 'x':1049 'xss':1046 'yes':526","prices":[{"id":"47f27032-1cf7-49fa-b3db-a7b81759c9fa","listingId":"ad9124cf-0130-4366-8d50-a303f3c28e3a","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:33:51.076Z"}],"sources":[{"listingId":"ad9124cf-0130-4366-8d50-a303f3c28e3a","source":"github","sourceId":"sickn33/antigravity-awesome-skills/burp-suite-testing","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/burp-suite-testing","isPrimary":false,"firstSeenAt":"2026-04-18T21:33:51.076Z","lastSeenAt":"2026-04-24T12:50:42.631Z"}],"details":{"listingId":"ad9124cf-0130-4366-8d50-a303f3c28e3a","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"burp-suite-testing","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34882,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-24T06:41:17Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"d1657dd90b460af4fadde32a53f13fc46a3cc366","skill_md_path":"skills/burp-suite-testing/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/burp-suite-testing"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"burp-suite-testing","description":"Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/burp-suite-testing"},"updatedAt":"2026-04-24T12:50:42.631Z"}}