Burp Suite 2020.6 freeware
... performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. ...
|OS||Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64|
|Installation||Instal And Uninstall|
|Keywords||application development, web application assessment, web application verifier, web application, assess, development|
Burp Suite Free Download - we do not host any Burp Suite torrent files or links of Burp Suite on rapidshare.com, depositfiles.com, megaupload.com etc. All Burp Suite download links are direct Burp Suite download from publisher site or their selected mirrors.
|2020.6||Jul 9, 2020||New Release||Experimental HTTP/2 support:
This release provides experimental support for HTTP/2. From the "Project settings" > "HTTP" tab, you can now choose to use HTTP/2 for inbound and outbound communication over TLS.
As this is still an experimental feature, please use it at your own discretion.
You can now control the TLS protocols that Burp Proxy will use when performing TLS negotiation with the browser. You can configure Burp Proxy to use the default protocols of your Java installation, or override these defaults and enable custom protocols as required.
In the HTTP history, you can now hover the mouse over URL encoded data to show the decoded data in a tooltip. Previously, this worked in Burp Repeater but not the "Proxy" > "HTTP history" tab.
|2020.5.1||Jun 19, 2020||New Release||Highlighting text no longer causes it to disappear and reappear after resizing the panel.
Clicking on an empty line now positions the cursor where you click instead of at the end of the previous line.
We have also fixed a security bug that was reported via our bug bounty program. With a significant amount of user interaction, an attacker could potentially read local files. The attacker would have to induce a user to visit a malicious website, copy the request as a curl command, and then execute it via the command line. This was classed as a medium severity issue due to the level of user interaction required.
|2.1.07||Dec 17, 2019||New Release||The support for WebSockets in Burp Repeater has been enhanced with a new WebSocket connection wizard that lets you:
Attach to an existing WebSocket that is currently open.
Reconnect to a WebSocket that has closed.
Clone a WebSocket.