-
Notifications
You must be signed in to change notification settings - Fork 1
Home
Postman2Burp bridges the gap between API development and security testing by automatically sending Postman collection requests through Burp Suite proxy. The tool solves the critical problem of translating existing API test collections into security testing workflows without manual recreation of complex request sequences.
Postman2Burp directly addresses these technical challenges:
- Converting Postman's request format to work with Burp Suite's proxy
- Maintaining session state across multi-step API flows
- Substituting environment variables with actual values
- Preserving authentication headers and tokens across requests
- Handling complex data structures in both requests and responses
Postman2Burp serves:
- Security Engineers testing APIs for OWASP Top 10 vulnerabilities using existing collections
- Penetration Testers who need to analyze API traffic for injection points and authentication bypasses
- API Developers validating security fixes without rebuilding test cases
- DevSecOps Teams automating security scans in CI/CD pipelines
- QA Engineers extending functional tests to include security validation
Postman2Burp addresses several critical API security testing challenges:
Use Case | Problem | Solution |
---|---|---|
OAuth2 Flow Analysis | Complex authentication flows with token extraction | Maintains request sequence and handles token extraction |
GraphQL API Security | Complex nested queries difficult to recreate | Preserves exact query structure and variables |
Anti-CSRF Protection | Token extraction and reuse across requests | Extracts and applies tokens automatically |
Authorization Testing | Testing with different user contexts | Supports running collections with different profiles |
API Gateway Testing | Complex headers and request signing | Preserves all authentication mechanisms |
For detailed examples, code samples, and technical implementation details for each use case, see the Use Cases documentation.
Ready to enhance your API security testing? Follow these steps to get started with Postman2Burp:
-
Install the Tool
Clone the repository and set up the environment:
git clone https://github.com/darmado/postman2burp.git cd postman2burp ./setup_venv.sh
-
Export Your Postman Collection
Export your collection from Postman in Collection v2.1 format.
-
Extract Variables
Generate a profile template from your collection:
python postman2burp.py --collection "your_collection.json" --extract-keys
-
Configure Your Environment
Edit the generated profile file with your environment variables.
-
Run the Tool
Send your collection through Burp Suite:
python postman2burp.py --collection "your_collection.json" --target-profile "your_profile.json" --proxy localhost:8080
-
Analyze Results in Burp Suite
Review the requests and responses in Burp Suite to identify security issues.
For more detailed instructions, see the Usage guide.