Professional Community
This extension is designed to help penetration testers and security professionals bypass HTTP 429 (Too Many Requests) rate-limiting mechanisms. The extension employs various techniques to circumvent rate-limiting and provides a flexible interface for customizing bypass strategies.
For encoding, null bytes, and parameter pollution, users can specify which parameter(s) to target. If no parameter is specified, the extension applies changes to all parameters by default.
By default, the extension applies changes to all parameters one by one if none are specified.
In the 429 Bypasser tab added at the top of Burp Suite, you can view the requests sent by the extension.
You can sort these requests by the Status Code column to help identify which requests successfully bypassed the rate limit.
Author |
Author
Iliya |
---|---|
Version |
Version
1.0 |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
03 April 2025 |
Estimated system impact |
Estimated system impact
Overall impact: Empty
Memory
Empty
CPU
Empty
General
Empty
Scanner
Empty
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.