Web Analytics

API_Sword

⭐ 361 stars English by Sugobet

[\[EN-ReadMe\]](https://github.com/Sugobet/API_Sword/blob/main/%5BEN%5D-README.md) <------ please read this

WeChat Official Account: APT250

Adhering to the principles of open source supremacy and communication learning, API Sword will be open-sourced and simultaneously launched on the official Burp plugin store BApp Store two weeks later (after September 7), facilitating everyone's future updates and usage. It is currently under official code review, and we believe it will be available on the BApp Store soon.

[New Classic Burp Plugin] API Sword - Fully Automatic Deep Collection of APIs in Various Responses

The jar package is in the release; after being listed on the official Burp plugin store, it can also be downloaded from the store.

Preface

This plugin combines my recent work content and some experience from the $40,000 bounty Microsoft account vulnerability API.

Developers using API Sword have repeatedly achieved results and general 0days in projects. With this tool, I no longer painfully search for any interfaces, paths, or parameters manually from any JS.

Insert image description here

Similar to many popular JS Finder, URLFinder, and other related JS and API mining tools, they are excellent tools, and API Sword gains capability and advantage thanks to Burp's features.

Screenshot of the plugin main page:

image

Main Features of API Sword

API Sword is fully automatic with loop prevention, extracting APIs and JS files within the specified range from various responses, then recursively deeply extracting APIs, actively requesting APIs, JS, and other valuable files.

The API results are WYSIWYG; the right window shows the source JS of the API, allowing you to immediately get API parameter information from the JS, then Burp can jump over with ctrl + r for testing.

It is not as complicated as imagined; what API Sword does more is reducing a large amount of repetitive, time-consuming, and tedious JS, API, and API parameter searching work for us.

Users only need to enable API Sword and set a "reasonable scope," then continue clicking various functions of the web system in the browser, letting all traffic pass through Burp, and finally handing it over to API Sword for analysis and processing. API Sword will return the devil fruits you want.

Considering opsec and other operational security risks, API Sword currently does not actively fuzz parameters. If there is demand later, this will be added as an optional feature.

How to Use?

Note: The plugin requires Burp Suite version 2024.7 or above; (for versions below 2024.7, you need to manually turn off the "Use Original Headers" feature on the plugin's settings page)

Using the API Sword is very simple,

API Sword Settings

In the Scope tab, we can set the range, which can be URL, domain name, or IP

image

This scope is especially important, it is recommended to consider carefully, otherwise you might easily scan outer space.

After setting the scope, let's look at the Setting tab

image

This option is enabled by default, it is not recommended to turn it off, otherwise API Sword cannot extract data more deeply

Enabled by default, if you want to specifically test unauthorized API interfaces, you can turn this option off, which will not carry any cookies or session information

Disabled by default, used to pause in case of emergencies, recommended to use together with the first option as a brake

This button is used to clear all site data in API Sword's Site Map

Insert image description here

Limit the interval time between each request

After enabling this option, API Sword will add the specified custom path to the main URL before concatenation

Other settings are under development and improvement. If you have any ideas, suggestions, or issues, you can provide feedback by opening an issue on GitHub.

Acknowledgments

Thanks to Microsoft

Thanks to my NSFOCUS mentor

Thanks to mil1ln

Thanks to Tanjie

Thanks to everyone who provided valuable opinions and feedback for API Sword during the testing phase

Thanks to all the above for all the support provided to API Sword!

TODO

--- Tranlated By Open Ai Tx | Last indexed: 2026-03-03 ---