Skip to content
/ rep Public

rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks

Notifications You must be signed in to change notification settings

bscript/rep

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

64 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Chrome Supported AppSec Tool Bug Bounty Friendly GitHub Stars Sponsor

rep+

rep+ is a lightweight Chrome DevTools extension inspired by Burp Suite's Repeater, now supercharged with AI. I often need to poke at a few requests without spinning up the full Burp stack, so I built this extension to keep my workflow fast, focused, and intelligent with integrated LLM support.

Watch Demo

What it does

  • No Proxy Setup: Works directly in Chrome. No need to configure system proxies or install CA certificates like in Burp Suite.

  • Capture & Replay: Captures every HTTP request you trigger while testing. Replay any request and freely manipulate the raw method, path, headers, or body to probe endpoints.

  • Filters & Regex: Powerful search across URL, headers, and body. Toggle Regex Mode for advanced pattern matching (e.g., finding specific tokens or IDs).

  • Converters: Right-click context menu to instantly encode/decode data:

    • Base64
    • URL Encode/Decode
    • JWT Decode (view payload instantly)
    • Hex / UTF-8
  • Screenshots: Built-in screenshot tool to capture the request/response pair for bug reports.

  • History & Navigation: Undo/redo support for edits and history navigation for selected requests.

  • Starring: Pin important requests to keep them at the top of your list.

  • Clear Workspace: Instantly clear all captured requests with a single click to start a fresh session.

  • Export & Import: Export requests as JSON to share findings with teammates or import them later. Perfect for rep+ ↔ rep+ workflows.

  • Bulk Replay: Burp Suite Intruder-style attacks with four attack modes:

    • Sniper: Tests each position independently with its own payloads
    • Battering Ram: All positions receive the same payload
    • Pitchfork: Zips payloads across positions (index-wise)
    • Cluster Bomb: Tests all combinations (Cartesian product)

    Mark multiple parameters with §, choose your attack type, configure payloads (List or Numbers) for each position, and inspect detailed results for every attempt. Includes pause/resume functionality for long-running attacks.

    • Response Diff: Git-style diff view to highlight changes between the baseline response and each attack result. Toggle "Diff View" to see additions (green) and deletions (red) at a glance.
  • Unified Extractor: A powerful tool to analyze JavaScript files, combining two key features:

    • Secret Scanner: Automatically scans captured JS files for hardcoded secrets (API keys, tokens, private keys).
      • Smart Detection: Uses entropy analysis and advanced filtering to minimize false positives.
      • Confidence Scores: Flags findings as High, Medium, or Low confidence.
    • Endpoint Extractor: Extracts API endpoints, URLs, and paths from JS files.
      • Smart Extraction: Finds full URLs, relative paths, and GraphQL endpoints.
      • Method Detection: Guesses HTTP methods (GET, POST, etc.) from context.
      • One-Click Copy: Instantly copy relative paths as full URLs (reconstructs the base URL automatically).
  • Theme Support: Auto-detects system theme (Light/Dark) and includes a quick toggle button ☀️/🌙 in the UI.

  • AI Capabilities: Integrated with Anthropic's Claude to help you understand requests and responses.

    • Explain Request: Click the ✨ button to get a detailed explanation of the current request.
    • Suggest Attack Vectors: Click the ▼ menu and select Suggest Attack Vectors to get a prioritized security checklist of potential vulnerabilities (IDOR, SQLi, etc.) tailored to the current request.
    • Context Menu: Highlight any text (header, parameter, error), right-click, and select "Explain with AI" for a targeted explanation.
    • Streaming Responses: Explanations appear in real-time.
    • Configuration: Configure your Anthropic API Key and Model (Claude 3.5 Sonnet, Opus, Haiku) in the Settings 🤖 menu.

Installation

  1. Clone the repository:
    git clone https://github.com/bscript/rep.git
  2. Open Chrome Extensions:
    • Navigate to chrome://extensions/ in your browser.
    • Enable Developer mode (toggle in the top right corner).
  3. Load the Extension:
    • Click Load unpacked.
    • Select the rep folder you just cloned.
  4. Open DevTools:
    • Press F12 or right-click -> Inspect.
    • Look for the rep+ tab (you might need to click the >> overflow menu).

This combo makes rep+ handy for bug bounty hunters and vulnerability researchers who want Burp-like iteration without the heavyweight UI. Install the extension, open DevTools, head to the rep+ panel, and start hacking. 😎

Star History

Star History Chart

Found a Bug or Issue?

If you encounter any bugs, unexpected behavior, or have feature requests, please help me improve rep+ by opening an issue here.
I’ll do my best to address it as quickly as possible! 🙏

❤️ Support the Project

I maintain rep+ alone, in my free time.
Sponsorship helps me keep improving the extension, adding new features, and responding to issues quickly.

If rep+ saved you time during testing, development, or bug bounty work, please consider supporting the project.
Every dollar helps. ❤️

Maintained by

Maintainer


Sponsors

Sponsor    Sponsor    Sponsor    Sponsor

Become a Sponsor

About

rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks

Resources

Stars

Watchers

Forks

Sponsor this project

 

Packages

No packages published