You can use Burp Repeater to manipulate and resend individual HTTP requests, and analyze the application's responses. You can also add notes to each tab, to help you to manage your work.
To send HTTP requests with Burp Repeater:
During testing, you can run custom action scripts to extract, transform, and analyze HTTP request and response data. You can run custom actions on demand, or configure them to run automatically when sending a request. For more information, see Custom actions.
When you identify a vulnerability during testing you can manually create an issue to include in your report. For more information, see Manually creating issues for reports.
For HTTP messages, each Repeater tab contains the following items:
The target server to which the request will be sent. This is set automatically when you send a request to Repeater. To configure the target details, click :
Controls to navigate the request history:
If you find something interesting in a request or response, you can add notes to the Repeater tab. This can help you to improve your workflow when you have multiple tabs open.
To add a note to an HTTP Repeater tab:
If you added notes in another Burp tool, these are copied into Repeater. In addition, if you send a message from Repeater to a tool that uses notes, your comments are copied across from Repeater.
Burp AI is built into Repeater, enabling you to run custom prompts against any tab. This flexible workflow gives you full control over what Burp AI examines, making it easy to tailor each task to your needs. For example, you can analyze a suspicious request, test for a specific vulnerability, or ask for suggestions on what to try next when you're unsure how to proceed.
Repeater also includes Explainer, a tool that provides instant AI-generated explanations for selected parts of a message. This is useful for quickly understanding headers, cookies, JavaScript, or other unfamiliar components without leaving your workflow.