Version 1.3
The JSON Escaper Burp Suite plugin simplifies the process of escaping JSON payloads for pentesters, as there is no built-in option for this in Burp. This is especially true when working with JSON payloads and trying to ensure that they are properly escaped to prevent errors. It eliminates the need for manual escaping and ensures proper formatting for testing. With its simple interface, the plugin enables you to enter your payload, escape it, and display the result in a JTextArea where you can select and copy the text
- Download the plugin JSON-Escaper.py
- Set up Jython in Burp Suite by going to the Extender tab and selecting the Options subtab. Under the "Python Environment" section, select "Use existing Jython standalone JAR" and browse to the location of the Jython standalone JAR on your computer
- In Burp Suite, go to the Extender tab and click on the "Add" button.
- Select "Python" as the extension type and select the JSON-Escaper.py file from your computer.
- The JSON Escaper tab will be added to the Burp Suite UI.
- Enter the payload in the text field and click on the "Escape" button.
- The escaped payload will be displayed in the JTextArea, where you can select and copy the text.
OR
Install from BApp store.
Please note that it is necessary to have Jython installed in order to use this plugin. If you do not have Jython installed, you can download it from the official website (http://www.jython.org/) and follow the instructions for installation.
If you have any feedback or suggestions, feel free to open an issue on this Github repository.
This plugin is licensed under the MIT License.