Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods and another script to Highlight Responses With Developer Notes And another script to Highlight Suspicious JavaScript Functions #30

Closed
wants to merge 10 commits into from

Conversation

BugBountyzip
Copy link
Contributor

@BugBountyzip BugBountyzip commented Dec 6, 2023

Bambda Contributions

  • Bambda has a valid header, featuring an @author annotation and suitable description
  • Bambda compiles and executes as expected
  • Only .bambda files have been added or modified (README.md files are automatically updated / generated after PR merge)

Update README file
fix the link
 The script is designed to efficiently parse through response data to identify and filter out email addresses. It begins by establishing a set of ignored file extensions, ensuring that the script does not process irrelevant response types such as images or multimedia files. The core functionality revolves around a regular expression that is meticulously crafted to detect email addresses within the response body, excluding specific file formats in the domain part of the email to enhance accuracy.
@BugBountyzip
Copy link
Contributor Author

Poc
image

This code targets HTTP requests that use deprecated or less common methods, such as TRACE and CONNECT. These methods are often overlooked but can be exploited in certain types of network attacks. When such a request is detected, the script highlights it in red within the Burp Suite interface, making it easy for security analysts to spot and investigate these potentially risky requests.
@BugBountyzip BugBountyzip changed the title Script to Filter Out Email Addresses in Responses and Highlight Them if Found Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Script to Filter and Highlight Requests Using Deprecated HTTP Methods Dec 7, 2023
@BugBountyzip BugBountyzip changed the title Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Script to Filter and Highlight Requests Using Deprecated HTTP Methods Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods Dec 7, 2023
 * This script identifies and highlights HTTP responses containing developer notes in HTML, JavaScript, or other files.

 * It differentiates the types of files and highlights them accordingly: green for HTML, yellow for JavaScript, and blue for other types.
@BugBountyzip BugBountyzip changed the title Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods and another script to Highlight Responses With Developer Notes Dec 7, 2023
@BugBountyzip
Copy link
Contributor Author

Dear team @Hannah-PortSwigger , @ibz-odumade-portswigger , @ps-porpoise , @PortSwiggerWiener
I have added another Bambda Script to Highlight Responses with Developer Notes

  • This script identifies and highlights HTTP responses containing developer notes in HTML, JavaScript, or other files.
  • It differentiates the types of files and highlights them accordingly: green for HTML, yellow for JavaScript, and blue for other types.
    Poc

image

This script is designed to enhance security assessments by identifying potentially hazardous JavaScript functions in web applications. It meticulously scans HTTP responses with a Content-Type of application/javascript and flags responses containing functions like eval(), setTimeout(), and document.write().. The script highlights such responses in red, drawing immediate attention, and adds concise notes specifying the detected functions.
@BugBountyzip BugBountyzip changed the title Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods and another script to Highlight Responses With Developer Notes Script to Filter Out Email Addresses in Responses and Highlight Them if Found and another Script to Filter and Highlight Requests Using Deprecated HTTP Methods and another script to Highlight Responses With Developer Notes And another script to Highlight Suspicious JavaScript Functions Dec 7, 2023
@BugBountyzip
Copy link
Contributor Author

Script to Detect and Highlight Suspicious JavaScript Functions has been Added+

Poc:

image

@ps-porpoise
Copy link
Contributor

Hey @BugBountyzip, thanks for your submissions. We'd prefer if you create a pull request for each individual bambda as it will help speed up our review process. Would you be able to split these out please?

That being said, these submissions looks great, we'll get back to you with a few suggestions soon. :)

@BugBountyzip
Copy link
Contributor Author

BugBountyzip commented Dec 7, 2023

Hello @ps-porpoise ,

Thanks for your feedback. Almost done

@BugBountyzip
Copy link
Contributor Author

Almost done

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants