Similar Request Excluder is an extension that enables you to automatically reduce the target scope of your active scan by excluding similar (and therefore redundant) requests.
Warning: some users have reported high memory and CPU usage when running the extension on large audits.
Reducing the target scope can be done by ignoring similar HTTP responses from the spider. If two HTTP responses have the same HTML structure it is likely that they have the same code flow and therefore the same security vulnerabilities. By measuring the similarity of HTTP responses it is possible to automatically reduce the target scope by removing the similar (and therefore redundant) HTTP responses.
For more information, please refer to the thesis.
Usage
Since version 1.1.0, Similar Request Excluder is completely automated. There is no need to mark your requests as 'out-of-scope' anymore. It will all be done automatically.
Documentation
The full documentation is available on Github. It contains, among other things, extra installation instructions and the FAQ.
Issues
If you are experiencing problems with Similar Request Excluder, please file an issue on the GitHub issue tracker or contact me personally via Twitter.