Autorize is an open-source automatic authorization and authentication enforcement detection extension for Burp Suite. Autorize passively monitors traffic generated by a high-privileged user, automatically replays requests using low-privileged or unauthenticated contexts, and analyzes the server responses to determine whether access controls are properly enforced. The extension is written in Python by Barak Tawily, an application security researcher and practitioner. Autorize is especially effective during authenticated testing, where traditional crawling and scanning tools fall short. Download Burp Suite Download Jython Standalone Configure Jython in Burp Install Autorize Verify installation Open the Autorize tab after installation. Navigate to Autorize → Configuration. Insert a low-privileged user authorization header: Note Optional settings: Click “Intercept is off” to start interception. Configure your browser to proxy traffic through Burp. Browse the application as a high-privileged user. Observe results in the Autorize table. Select any entry to inspect: Autorize assigns one of the following statuses to each tested endpoint: Authorization or authentication was not enforced. Access controls were properly enforced. Autorize could not reliably determine enforcement and requires manual fingerprint configuration. When enforcement cannot be automatically determined, you can configure Enforcement Detectors. There are two detector categories: If a modified request returns a response containing: Add this string (or a regex) as a fingerprint in the enforcement detector. Autorize will then automatically recognize authorization enforcement for similar responses. Interception filters control which requests are analyzed by Autorize, helping reduce noise and improve performance. Autorize includes default filters to exclude static assets such as images and scripts. Example configuration: Contributions are welcome. Barak Tawily
It is designed to assist application security engineers and penetration testers in identifying authorization bypasses and authentication weaknesses in web applications—at scale and with minimal manual effort.
https://portswigger.net/burp/download.html
https://www.jython.org/download.htmlgit clone https://github.com/Quitten/Autorize.git
Autorize.py
Headers defined here will be replaced if already present or added if missing.You are not authorized to perform this action
Feel free to open issues, submit pull requests, or suggest improvements.
CTO @ Enso Security
Application Security Researcher – https://quitten.github.io/
Former Application Security Consultant @ AppSec Labs

