Offensive Web
Application Security

SCANNING TOOLS BUILT BY PENTESTERS, FOR PENTESTERS

Stop Scanning Blind. Start Scanning Smart.

Burp Bounty Pro extends Burp Suite with custom vulnerability profiles, Smart Scan rules, and multi-step scanning — so you find what automated scanners miss, without writing code. Built by a pentester, for pentesters.

254 Default Profiles
27 Smart Scan Rules
30+ Insertion Point Types
v3.0 Latest Release

🧠 Smart Scan (IF-THEN Rules)

Chain passive detection with active attacks automatically. Detect WordPress? Launch WordPress-specific exploit profiles. Spot SQLi-prone parameters? Trigger targeted injection testing. 27 pre-configured rules included.

🎯 254 Ready-to-Use Profiles

Start scanning immediately with built-in profiles covering CVEs, XSS, SQLi, SSRF, SSTI, RCE, path traversal, technology detection, and sensitive data exposure. Or build your own — no code required.

🔗 Multi-Step Scanning

Chain multiple scanning steps with cookie reuse and sequential execution. Test complex authenticated workflows and multi-stage attack scenarios that single-request scanners can't reach.

⚡ Granular Scan Control

Per-scan thread pools, configurable request rate limiting, true pause/resume without losing state, and tag-based organization. Run different scans with different settings simultaneously.

📍 30+ Insertion Point Types

Test URL parameters, body params, cookies, JSON keys/values, XML, HTTP headers, URL path components, and more. Define exactly where payloads are injected — far beyond Burp Suite's defaults.

🏷️ Tags & Profile Management

Organize profiles by technology stack, vulnerability type, or custom categories. Launch passive scans by tag to run only the checks you need. Import/export profiles across teams with .bb files.

"The ability to perform a fast, targeted analysis of endpoints and select vulnerability types based on my prior manual analysis significantly optimizes both time and efficiency. Creating custom scanners with custom payloads allows me to automate part of my workflow and adapt it to my specific methodology."

— Application Security Researcher & Bug Bounty Hunter, Burp Bounty Pro user

Works with Burp Suite Professional. Java 14+ required. Set up in under 5 minutes.

10,000+ Requests per Second. Distributed. From Inside Burp Suite.

Burp Bounty Go is a high-performance vulnerability scanner powered by a Golang engine. Run multiple scanning servers on localhost or remote VPS, detect blind vulnerabilities with a built-in Blind Host, and manage everything from Burp Suite — no external tools needed.

10K+ Requests/Second
Golang Scanning Engine
Distributed Servers
Built-in Blind Host (OOB)

⚡ Extreme Performance

The scanning engine is written in Golang, capable of processing over 10,000 requests per second. Offload scanning logic from Burp Suite to a dedicated server — your workstation stays fast while the scanner does the heavy lifting.

🌐 Distributed Scanning

Run multiple scanning servers on localhost or remote VPS instances and manage them all from a single Burp Suite interface. Scale horizontally to match the scope of your engagement — one server or ten.

🔗 Multi-Step Profiles

Define complex attack chains with multi-step scanning logic. Each step can build on the previous one — test the same vulnerable parameter or branch to all insertion points. Reduces false positives significantly.

👁 Built-in Blind Host

Detect Out-of-Band (OOB) vulnerabilities natively with the integrated Blind Host system. Use the {BH} token in payloads — any DNS/HTTP interaction is automatically reported. No Burp Collaborator or external services required.

🎯 Flexible Detection Engine

Match vulnerabilities with simple strings, regex, HTTP status codes, time-based delays, or Blind Host interactions. Active and passive profiles let you scan intrusively or analyze traffic silently — your choice.

🏷️ Tag-Based Scan Launching

Organize profiles by technology, vulnerability type, or custom categories. Right-click any request in Burp Suite and launch targeted scans by tag — run only WordPress checks, only SQLi payloads, or your custom attack set.

See Burp Bounty Go in action:

Works with Burp Suite. Runs on Linux, macOS, and Windows.

GBounty: High-Speed Web Vulnerability Scanner in Golang

GBounty is a free, open-source web vulnerability scanner built in Golang for speed and precision. It uses multi-step, profile-based scanning to detect vulnerabilities across web applications — from exposed parameters and software versions to complex chained attack scenarios. Runs on Linux, Windows, and macOS.

If you use Burp Bounty Pro or Burp Bounty Go, GBounty shares the same profile format — so your custom profiles work across all three tools. If you need a standalone scanner outside of Burp Suite, GBounty is your answer.

What makes GBounty different:

  • Golang Performance: Built from the ground up in Go for high-speed scanning. Process thousands of requests per second with minimal system resources.
  • Multi-Step Profile Scanning: Define complex attack chains with multiple steps — each with its own payloads, match rules, and detection logic. Reduces false positives and catches vulnerabilities that single-step scanners miss.
  • Cross-Platform: Native binaries for Linux, Windows, and macOS. No dependencies, no runtime — just download and run.
  • Profile Compatible: Uses the same .bb profile format as Burp Bounty Pro and Burp Bounty Go. Share profiles across your entire toolkit.

Open Source — Free to use, inspect, and contribute. The core scanning engine that powers the Bounty Security ecosystem.

Bounty Prompt: AI-Powered Security Analysis Inside Burp Suite

Bounty Prompt is a free, open-source Burp Suite extension that connects your HTTP traffic directly to AI engines. Save pre-configured prompts, attach any request/response from Burp Suite, and get tailored security insights in seconds — powered by Burp AI and Groq Cloud.

Stop copying and pasting HTTP requests into ChatGPT. Bounty Prompt sends the full context to the AI automatically and returns actionable analysis — from vulnerability identification to exploitation suggestions — without leaving Burp Suite.

What Bounty Prompt does for you:

  • AI-Powered Security Prompts: Send HTTP requests and responses to AI with pre-configured prompts tailored for security analysis. Ask the AI to find vulnerabilities, suggest payloads, analyze authentication flows, or explain suspicious behavior.
  • Dual AI Engine Support: Works with both Burp AI (native) and Groq Cloud, so you can choose the engine that fits your workflow and budget.
  • Dynamic HTTP Tags: Use tags to automatically inject request/response data into your prompts. No manual copy-paste — the extension handles the context for you.
  • Automated Issue Creation: AI findings can be converted into Burp Suite issues directly, keeping your scan results organized in one place.

Open Source — Free to use, inspect, and contribute. Built by the community, for the community.

Why Authenticated Scanning Matters

The highest-severity vulnerabilities live behind the login — broken access controls, privilege escalation, user-specific logic flaws. Burp Bounty Pro's multi-step scanning with cookie reuse tests what unauthenticated scanners never reach.

About Us

Security Tools Built by Pentesters, for Pentesters

Eduardo Garcia — Founder of Bounty Security

Bounty Security builds offensive security tools that solve the problems we face ourselves. From Burp Bounty Pro with 254 vulnerability profiles and Smart Scan rules, to Burp Bounty Go processing 10,000+ requests per second across distributed servers, to open-source tools like Bounty Prompt (AI-powered security analysis) and GBounty (standalone Golang scanner) — everything we ship comes from real-world pentesting experience.

Built for the people who break things to make them safer:

  • Pentesters & Security Consultancies: Automate the repetitive parts of your engagements — from technology detection to targeted CVE testing — so you can focus on the complex vulnerabilities that require human judgment.
  • Red Teams: Chain multi-step attack profiles, scale scanning across distributed servers, and test authenticated workflows with the speed and precision your operations demand.
  • Bug Bounty Hunters: Cover more surface area in less time. Custom profiles, Smart Scan rules, and built-in blind vulnerability detection give you an edge on every program you join.
  • AppSec & Development Teams: Integrate automated vulnerability scanning into your security workflow. Identify misconfigurations, exposed secrets, and known CVEs before they reach production.

One Profile Format. Every Tool.

Build a vulnerability profile once, export it as a .bb file, and use it across Burp Bounty Pro, Burp Bounty Go, and GBounty. Your custom detection logic works everywhere.

Our Mission

BUILT BY PENTESTERS, FOR PENTESTERS

We build offensive security tools that solve real problems in the field. Our scanners are used daily by penetration testers, Red Teams, and bug bounty hunters to find vulnerabilities faster — with the precision and control that automated tools usually lack.

Fast Scans, Smarter Results

Our Golang scanning engine processes 10,000+ requests per second. Burp Bounty Pro runs 254 profiles with per-scan thread control. We don't just claim speed — we engineer it into every component.

Automate Without Losing Control

Smart Scan rules chain passive detection with active attacks automatically. Multi-step profiles test complex workflows. You define exactly what to scan and how — the tools handle the repetitive work.

Your Workflow, Your Rules

Custom profiles, configurable payloads, 30+ insertion point types, tag-based scan launching, and importable/exportable .bb profile files. Every tool adapts to how you work — not the other way around.

What do users say about our products?

★★★★★

Go check the new Burp Bounty release! This awesome plugin helps me a lot in my daily bug hunting and pentest 💪🏼
#bugbounty

Diego Jurado
★★★★★

Never heard of "Burp Bounty"? Then check it out, it's an awesome Burp extension and you should be using it already!

sw33tLie
★★★★★

Bounty Thursdays - H1 paid $2.4m to hackers in ONE week , VirSecCon aftermath & Burp Bounty update.

STÖK ✌️
★★★★★

😎 Seriously, you should already be using Burp Bounty Pro
@BurpBounty
#BugBounty #bugbountytips

Six2dez
★★★★★

The ability to perform a fast, targeted analysis of endpoints and select vulnerability types based on my prior manual analysis significantly optimizes both time and efficiency. Creating custom scanners with custom payloads allows me to automate part of my workflow and adapt it to my specific methodology.

Application Security Researcher & Bug Bounty Hunter
★★★★★

Checks for SSRF issues — it's awesome! I've found a large number of stored XSS, SSRFs, and XML injection vulnerabilities. I need faster workflows because I have a high volume of applications to test.

Penetration Tester, Security Consultancy
★★★★★

Selecting a specific endpoint and choosing the type of vulnerability to search for — that's what saves me the most time. Single endpoint selection with customizable vulnerability scan type is exactly what I needed.

Penetration Tester, In-house Security Team
★★★★★

It gives me a well-organized system for scanning and defining issues. Smart Scan is the feature I value most — it automates the repetitive parts without losing control over what gets tested.

Penetration Tester, Security Consultancy
★★★★★

Passive scanning on large websites with many endpoints — that's where Burp Bounty Pro saves me the most time. Updated profiles, passive scanning capabilities, and the ease of creating new profiles are the features I value most.

Penetration Tester, Security Consultancy
★★★★★

Automated authenticated scanning with customizable profiles — it maintains login state and tests pages behind login forms that standard scans skip. This dramatically reduces the need for manual session handling and repetitive testing.

Cybersecurity Engineer

Main Clients

Trusted by security teams worldwide.

FAQs

Our solutions are built for efficiency, adaptability, and precision—with a special emphasis on authenticated scanning. By seamlessly integrating with top platforms like Burp Suite Pro, our tools allow you to test even behind login screens, centralizing all findings into one project. Plus, advanced customization ensures you can tackle any testing scenario with ease.

Not necessarily. While our products include powerful features for seasoned pros—like automating scans in authenticated sessions—they’re also designed to be intuitive for those new to cybersecurity. This balance makes it simple for users of all experience levels to set up effective scans right away.

Yes. Our tools, including Burp Bounty Pro and GBounty, are fully compatible with Linux, Windows, and macOS, ensuring you can run authenticated and unauthenticated tests across any environment.

Absolutely. We offer dedicated technical support to help with setup, troubleshooting, and maximizing your tool’s capabilities—particularly when configuring authenticated scanning. Our products also receive regular updates to stay ahead of evolving security threats, guaranteeing continued reliability and effectiveness.

Your privacy is a priority. Our tools conduct scans locally, without sending sensitive data to external servers. We also adhere to industry best practices to maintain the highest level of data integrity and confidentiality, ensuring that any information gathered—authenticated or not—remains secure.

Burp Bounty Pro

Custom Profiles · Smart Scan · Multi-Step Detection

Extend Burp Suite with 254 vulnerability profiles, 27 Smart Scan rules, and multi-step scanning with cookie reuse. Define custom payloads, match conditions, and detection rules — or use the built-in profiles to start finding real vulnerabilities in under 5 minutes.

Time-based detection engine · 30+ insertion point types · Per-scan thread control · Tag-based scan launching · Pause/resume without losing state · Import/export .bb profiles across your team.