Extension that looking for PII data in passive requests.
- Download Jython standalone JAR, for example version 2.7.3
- Go to Extensions->Extensions settings. Set path inside
Location of Jython standalone JAR filein Python enviroment.
- Unzip the burp extension PII-SCAN.zip
- Go to Extensions->Installed. Click Add. Set
Extension typetoPython. Setburp_pii_scan.pyinsideExtension fileand press Next button.
Install extension. Browse sites through Burp proxy. If the extension found PII data it will create a log in console, create a issue with the data leaked and how to remediate.






