AuthKit: A Burp Suite Plugin for Automated Privilege‑Escalation Detection

AuthKit is a Burp Suite extension that expands a single request into Original, Unauthorized and multiple‑role samples to uncover unauthorized access, horizontal and vertical privilege escalation, and BOLA issues, offering passive capture, right‑click active testing, multi‑identity replay, metric dashboards, diff views, context‑menu integration, and flexible scope controls.

Black & White Path
Black & White Path
Black & White Path
AuthKit: A Burp Suite Plugin for Automated Privilege‑Escalation Detection

Tool Overview

AuthKit is a Burp Suite extension that expands a single business request into Original / Unauthorized / 多角色 comparison samples, enabling detection of unauthorized access, horizontal privilege escalation, vertical privilege escalation, and object‑level access control missing (BOLA).

It supports passive traffic capture and right‑click active testing, making it suitable for integration into daily Burp workflows.

Interface

Screenshot
Screenshot
Screenshot
Screenshot
Screenshot
Screenshot
Screenshot
Screenshot

Core Capabilities

Multi‑identity automatic replay : automatically generates comparison results for Original, Unauthorized, and UserA/UserB/….

Multidimensional metric display : shows Length, Status Code, Hash, AttributeNum, and Rank.

Rapid anomaly location : table diff coloring, metadata panel, and Response Diff view.

Context‑menu integration : provides Send to AuthKit and Extract Auth to User commands.

Flexible scope control : configurable Domain Scope, Request Filter, and Tool Type Scope.

Applicable Scenarios

Use Unauthorized to quickly check for unauthorized access.

Use UserA / UserB to compare horizontal privilege escalation.

Use User / Admin to compare vertical privilege escalation.

Replace parameters to verify object‑level access control for resource ID, tenant ID, user ID, etc.

Batch‑inspect high‑risk endpoints in Proxy / Repeater.

Tool Acquisition

Repository:

https://github.com/youmulijiang/AuthKit
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Automationsecurity testingprivilege escalationBurp SuiteBOLAAuthKit
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.