Skip to content

BurpSuite Extension leveraging new Montoya API to automatically sets payload positions to your inruder tab saving you time during VAPT.

License

Notifications You must be signed in to change notification settings

netsquare/Auto-Payload-Positioner

Auto Payload Positioner

A Pentester’s handy tool for Automated Insertion Point Placement

⚡ Fully Automated, Quick, Handy - Intruder Payload Positioner so you don't have to!

GitHub contributors Auto Payload Positioner GitHub all releases GitHub release (latest by SemVer) Latest release Java 17+ License

Cyberpunk Auto Payload Positioner Overview Image generated using AI tools.


What is Auto Payload Positioner?

A Burp Suite extension built on the Montoya API that automatically detects and marks “interesting” insertion points throughout an HTTP request. Rather than manually highlighting each location (headers, parameters, JSON/XML/form bodies, etc.), this extension sets payload positions for you—so you can focus on testing vulnerabilities, not on placement.

Watch the demo!

2025-04-29.00-12-08.mp4

Features

  • Automatic detection of insertion points

    • HTTP method (GET, POST, etc.)

    • Last path segment of the URL

    • URL query parameters

    • Form data parameters

    • Header values (Cookie, Authorization, and all other headers)

    • JSON bodies (keys, values, nested objects/arrays)

    • XML bodies (tag content, attributes)

    • Embedded formats and key=value pairs in text/plain or mixed bodies

  • Context-menu integration

    • Right-click on any request in Proxy, Target, Intruder, or Repeater

    • Select Set positions to auto-mark insertion points

  • Intruder-ready

    • Builds an HttpRequestTemplate with all detected ranges

    • Sends the request directly to Intruder with your custom positions

  • Robust range validation

    • Filters out invalid, overlapping, or out-of-bounds ranges

    • Ensures stable behavior even on complex requests

🛠️ Getting Started

2. Installation

2025-04-28.23-59-42.mp4
  • Load into Burp

  • Open Burp Suite → Extensions.

  • Click Add.

  • Choose Java as the extension type.

  • Select your downloaded JAR.

  • Confirm & ensure Simple Payload Positioner appears in the list.

  • Verify, In the Extender output tab, look for: Simple Payload Positioner loaded successfully!

3. Usage

2025-04-29.00-12-08.mp4
  • Send or capture a request in Proxy, Repeater, Intruder, or Target.

  • Right-click anywhere on the request.

  • Select Set positions from the context menu.

  • The extension will:

    • Scan the request for all “interesting” parts

    • Automatically highlight each range with Intruder markers (§)

    • Send the templated request to Intruder

  • Switch to Intruder, review the auto-populated payload positions, and launch your attack.

Building from Source

# Clone the repo
git clone https://github.com/yourusername/simple-payload-positioner.git
cd simple-payload-positioner

# (Maven)
mvn clean package

The built JAR will be in target/ 

Load that JAR in Burp as described above.

To report bugs, issues, feature suggestion, Performance issue, general question, Documentation issue.

  • Kindly open an issue with respective template.

Acknowledgment

This project is an extension for Burpsuite and leverages Montoya API

📄 License

Auto-Payload-Positioner and all related projects inherits the Apache 2.0, see License

⚖️ Legal Warning

Disclaimer

The burpsuite extension Auto-Payload-Positioner and all related tools under this project are intended strictly for educational, research, and ethical security assessment purposes. They are provided "as-is" without any warranties, expressed or implied. Users are solely responsible for ensuring that their use of these tools complies with all applicable laws, regulations, and ethical guidelines.

By using Auto-Payload-Positioner, you agree to use them only in environments you are authorized to test, such as applications you own or have explicit permission to analyze. Any misuse of these tools for unauthorized reverse engineering, infringement of intellectual property rights, or malicious activity is strictly prohibited.

The developers of Auto-Payload-Positioner shall not be held liable for any damage, data loss, legal consequences, or other consequences resulting from the use or misuse of these tools. Users assume full responsibility for their actions and any impact caused by their usage.

Use responsibly. Respect intellectual property. Follow ethical hacking practices.


🙌 Contribute or Support

Contributing

Contributions Welcome

  • Found it useful? Give it a ⭐️
  • Got ideas? Open an issue or submit a PR
  • Built something on top? DM me or mention me — I’ll add it to the README!

Other Projects


Built with ❤️ for all hackers!

About

BurpSuite Extension leveraging new Montoya API to automatically sets payload positions to your inruder tab saving you time during VAPT.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages