We stand with Ukraine to help keep people safe. Join us
When you purchase through links on our site, we may earn an affiliate commission

Burp Suite for Mac

Platform for performing security testing of web applications.

$499.00
In English
2.8
Based on 2 user rates

Burp Suite overview

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.

Burp is easy to use and intuitive, allowing new users to begin working right away. Burp is also highly configurable, and contains numerous powerful features to assist the most experienced testers with their work

Features:
  • An intercepting Proxy, which lets you inspect and modify traffic between your browser and the target application.
  • An application-aware Spider, for crawling content and functionality.
  • An advanced web application Scanner, for automating the detection of numerous types of vulnerability.
  • An Intruder tool, for performing powerful customized attacks to find and exploit unusual vulnerabilities.
  • A Repeater tool, for manipulating and resending individual requests.
  • A Sequencer tool, for testing the randomness of session tokens.
  • The ability to save your work and resume working later.
  • Extensibility, allowing you to easily write your own plugins, to perform complex and highly customized tasks within Burp.

What’s new in version 2026.2.4

  • [TBD][475877320] Critical CVE-2026-4439: Out of bounds memory access in WebGL. Reported by Goodluck on 2026-01-15
  • [TBD][485935305] Critical CVE-2026-4440: Out of bounds read and write in WebGL. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-20
  • [TBD][489381399] Critical CVE-2026-4441: Use after free in Base. Reported by Google on 2026-03-03
  • [TBD][484751092] High CVE-2026-4442: Heap buffer overflow in CSS. Reported by Syn4pse on 2026-02-16
  • [TBD][485292589] High CVE-2026-4443: Heap buffer overflow in WebAudio. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-18
  • [TBD][486349161] High CVE-2026-4444: Stack buffer overflow in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-21
  • [TBD][486421953] High CVE-2026-4445: Use after free in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
  • [TBD][486421954] High CVE-2026-4446: Use after free in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-22
  • [TBD][486657483] High CVE-2026-4447: Inappropriate implementation in V8. Reported by Erge on 2026-02-23
  • [TBD][486972661] High CVE-2026-4448: Heap buffer overflow in ANGLE. Reported by M. Fauzan Wijaya (Gh05t666nero) on 2026-02-23
  • [TBD][487117772] High CVE-2026-4449: Use after free in Blink. Reported by Syn4pse on 2026-02-24
  • [TBD][487746373] High CVE-2026-4450: Out of bounds write in V8. Reported by qymag1c on 2026-02-26
  • [TBD][487768779] High CVE-2026-4451: Insufficient validation of untrusted input in Navigation. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-02-26
  • [TBD][487977696] High CVE-2026-4452: Integer overflow in ANGLE. Reported by cinzinga on 2026-02-26
  • [TBD][488400770] High CVE-2026-4453: Integer overflow in Dawn. Reported by sweetchip on 2026-02-27
  • [TBD][488585488] High CVE-2026-4454: Use after free in Network. Reported by heapracer (@heapracer) on 2026-03-01
  • [TBD][488585504] High CVE-2026-4455: Heap buffer overflow in PDFium. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-01
  • [TBD][488617440] High CVE-2026-4456: Use after free in Digital Credentials API. Reported by sean wong on 2026-02-28
  • [TBD][488803413] High CVE-2026-4457: Type Confusion in V8. Reported by Zhenpeng (Leo) Lin at depthfirst on 2026-03-01
  • [TBD][489619753] High CVE-2026-4458: Use after free in Extensions. Reported by Shaheen Fazim on 2026-03-04
  • [TBD][490246422] High CVE-2026-4459: Out of bounds read and write in WebAudio. Reported by Jihyeon Jeong (Compsec Lab, Seoul National University / Research Intern) on 2026-03-06
  • [TBD][490254124] High CVE-2026-4460: Out of bounds read in Skia. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-06
  • [TBD][490558172] High CVE-2026-4461: Inappropriate implementation in V8. Reported by Google on 2026-03-07
View older Burp Suite versions

Burp Suite for Mac

$499.00
In English
Version 2026.2.4
Write a detailed review about Burp Suite

Write your thoughts in our old-fashioned comment

MacUpdate Comment Policy. We strongly recommend leaving comments, however comments with abusive words, bullying, personal attacks of any type will be moderated.
2.8

(6 Reviews of Burp Suite)

  • Comments

  • User Ratings

Awado
Awado
Mar 5 2026
2026.2.3
0.0
Mar 5 2026
0.0
Version: 2026.2.3
Note that there's a community edition on their website for free.
ERNEST UNGUREANU
ERNEST UNGUREANU
Dec 18 2024
2024.11.1
1.0
Dec 18 2024
1.0
Version: 2024.11.1
"burp /barp/ INFORMAL verb noisily release air from the stomach through the mouth; belch bring up wind rift gurk bolk. a noise made by air released from the stomach through the mouth; a belch rift gurk bolk eructation"
ERNEST UNGUREANU
ERNEST UNGUREANU
Apr 23 2021
2021.4.2
1.0
Apr 23 2021
1.0
Version: 2021.4.2
burping : "informal – to release air through the mouth from the stomach, causing a noise — In some countries, it is a sign of respect to the cook to burp after a meal. to pat (a baby’s back) in order to make it burp — Jorge burped the baby before putting him to bed."
Dp-G4-450guy
Dp-G4-450guy
Dec 2 2020
2020.11.3
0.0
Dec 2 2020
0.0
Version: 2020.11.3
for $400 it better take me to dinner and I get lucky afterwards .....
ERNEST UNGUREANU
ERNEST UNGUREANU
Nov 22 2020
2020.11.1
1.0
Nov 22 2020
1.0
Version: 2020.11.1
What a strange name : Burp...
ERNEST UNGUREANU
ERNEST UNGUREANU
Nov 22 2020
1.0
Nov 22 2020
1.0
Version: null
anthony.gelibert
anthony.gelibert
Mar 6 2019
4.5
Mar 6 2019
4.5
Version: null