Burp Suite is a widely used toolkit for web application security testing, popular among penetration testers and security researchers.

Developed by PortSwigger, pre-installed in Kali Linux, and backed by over two decades of web security research.
PortSwigger’s Web Security Academy, used by millions of learners worldwide, is built on the same vulnerability research that powers Burp Suite’s detection engine.
Three editions: Community (free), Professional (~$475/year), and Burp Suite DAST (formerly Enterprise) for automated CI/CD scanning.
Key Features
| Feature | Details |
|---|---|
| Editions | Community (free), Professional (~$475/yr), DAST (enterprise) |
| Proxy | Intercepting proxy for HTTP/HTTPS/WebSocket |
| Scanner | Active and passive vulnerability scanning (Pro/DAST) |
| Extensions | 500+ BApps in the BApp Store |
| Attack tools | Intruder (Sniper, Battering Ram, Pitchfork, Cluster Bomb) |
| AI | Burp AI for scan analysis and attack suggestions |
| CI/CD | Docker-based scanning for DAST edition |
| Vuln coverage | XSS, SQLi, CSRF, XXE, SSRF, directory traversal, and more |
The core of Burp Suite. Sits between your browser and the target, capturing every HTTP/HTTPS request and response.
Inspect, modify, and replay traffic in real-time. Handles TLS interception, WebSocket messages, and match-and-replace rules.
Automated vulnerability detection with active probing and passive analysis. Covers OWASP Top 10 and beyond.
Configurable scan profiles let you tune speed vs. thoroughness. The DAST edition runs from a Docker container for CI/CD integration.

Manual Testing Tools
The manual testing tools are what separate Burp from automated-only DAST scanners:
- Repeater — Send individual requests and iterate. Modify parameters, headers, and payloads to probe application behavior one request at a time.
- Intruder — Automated attack tool for fuzzing and brute-forcing. Four attack types: Sniper (single position), Battering Ram (same payload everywhere), Pitchfork (parallel payloads), Cluster Bomb (all combinations).
- Comparer — Diff two responses to spot subtle differences in application behavior.
- Decoder — Encode and decode data in various formats (Base64, URL, hex, HTML).
- Sequencer — Analyze the quality of randomness in tokens and session IDs.
Editions Compared
Community Edition — Free. Manual testing tools with throttled scanning. Good for learning and basic assessments. No automated scanner.
Professional — ~$475/year. Full automated scanner, unthrottled Intruder, all manual tools, BApp Store access, Burp AI. The go-to for individual pentesters and security researchers.
Burp Suite DAST — Formerly Enterprise Edition, renamed April 2025. Designed for teams and CI/CD.
Runs from Docker containers. Supports Jenkins, GitHub Actions, GitLab CI, Azure DevOps, and TeamCity. Cloud-hosted or self-hosted options.
Integrations
The DAST edition supports custom extensions, BChecks, and BApps in CI-driven scans.
Getting Started
Professional penetration testers and security researchers who need manual control over web traffic. Nothing else gives you the same combination of proxy, scanner, and extensibility.
For teams that only need automated CI/CD scanning, the DAST edition runs Burp’s scanner engine without requiring manual interaction.
Limitations
The Community Edition is severely limited for real-world work. Scan speeds are throttled, and you cannot save projects.
If you are serious about web security testing, you need at least Professional.
Burp Suite is focused on web applications. It does not scan infrastructure, APIs defined only by specifications (without a running server), or mobile application binaries.
For developer-friendly automated DAST without manual testing, consider Bright Security or StackHawk. For open-source alternatives, see ZAP.
For a full rundown of options, see our Burp Suite alternatives guide.
Burp Suite is a DAST tool — see what is DAST for background on dynamic testing. It does not replace SAST, though it pairs well with static tools for full coverage.
Note: Enterprise Edition renamed to Burp Suite DAST in April 2025. Available as cloud-hosted or self-hosted.