PII Sniffer is an extension for Burp Suite developed to detect sensitive personal information (PII) in intercepted HTTP responses. The extension identifies CPFs (Brazilian individual taxpayer registry numbers), phone numbers, important dates (such as birthdates), and credit card numbers, making it easier to identify potential personal data leaks.
- Detects and validates CPFs in HTTP responses.
- Searches and lists phone numbers.
- Detects important dates in DD/MM/YYYY and MM/DD/YYYY formats.
- Identifies possible credit card numbers, validated using the Luhn algorithm.
- Generates reports on detected PII occurrences, allowing for a detailed analysis of potential data leaks.
- Burp Suite - Community or Professional Version
- Jython Standalone - Required to support Python extensions in Burp Suite
-
Download the extension: Clone or download this repository to get the
PII_Sniffer.py
file. -
Set up Jython in Burp:
-
Load the extension:
-
Installation Confirmation:
- Intercept and analyze HTTP traffic with Burp Suite active.
- Check the Output:
- The extension automatically analyzes HTTP responses for CPFs, phone numbers, important dates, and credit card numbers.
- When a valid match is found, such as a CPF, phone number, date, or credit card number, it will be displayed in the output log.
- Results:
Each identified item is validated and displayed, providing a comprehensive diagnosis of potential personal data leaks.
Contributions are welcome! Feel free to fork the project, open pull requests, or report issues.
Note: This extension is intended for ethical use only. Always obtain permission before testing and analyzing third-party data. The user is solely responsible for any misuse of this tool.