Colonel Clustered Finding Outliers in Burp Intruder #1788
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post: “Colonel Clustered: Finding Outliers in Burp Intruder” (TrustedSec, January 20, 2026) by Drew Kirkpatrick.
Problem being solved (why Intruder misses bugs):
Burp Intruder is commonly used to fuzz inputs and then spot “interesting” results by sorting on Intruder’s built-in columns: response size, status code, content-type, and response time. These are convenient but are weak proxies for the real signal: small differences in response body content that ...
🔧 Technical Details
Content-based outlier detection for fuzzing results: When Intruder responses are too similar for metadata sorting (size/status/content-type/time), tokenize each response body (using tokenizers tailored to content-type/format), optionally pre-group to reduce computation, then cluster request/response pairs by similarity of tokenized content. Outliers become small clusters (often singletons), which can then be confirmed by diffing with Burp Comparer.
Two-stage clustering to balance speed and accuracy: Use a fast DBSCAN-based clustering pass for most datasets, but when misclustering occurs, re-run with a slower similarity-matrix-based clustering (“Deep Analysis”) to more reliably separate true outliers. Provide progress indication and cancellation to keep large fuzzing jobs usable, and avoid running the similarity-matrix approach on very large datasets (e.g., ~10k results) due to runtime.
Parameter auto-calibration using batched datasets: Because Intrud...
🤖 Agent Actions
Updated HackTricks with Colonel Clustered Burp Intruder response clustering guidance and integration:
burp-intruder-response-clustering.mddetailing why response-content clustering catches hidden outliers, workflow steps (send Intruder results → fast DBSCAN vs. Deep Analysis similarity matrix → diff with Burp Comparer), performance cautions, and install links.References: TrustedSec blog “Colonel Clustered: Finding Outliers in Burp Intruder” and the tool’s GitHub.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.