Burpsuite MCP Server

Burpsuite MCP Server

By Cyreslab-AI GitHub

-

burpsuite mcp-server
Overview

what is Burpsuite MCP Server?

Burpsuite MCP Server is a Model Context Protocol (MCP) server that provides an interface for interacting with Burpsuite Professional's scanning and proxy functionality, enabling AI assistants to perform web security testing and vulnerability scanning.

how to use Burpsuite MCP Server?

To use the Burpsuite MCP Server, set it up by building the server and configuring it in your MCP settings. You can then interact with it through various commands to start scans, check statuses, and retrieve results.

key features of Burpsuite MCP Server?

  • Start vulnerability scans on target URLs
  • Check scan status and retrieve results
  • Access HTTP/HTTPS traffic captured by Burp Proxy
  • View site structure discovered during scanning

use cases of Burpsuite MCP Server?

  1. Automating web security assessments for applications.
  2. Integrating with AI assistants for real-time vulnerability analysis.
  3. Monitoring and analyzing HTTP traffic for security insights.

FAQ from Burpsuite MCP Server?

  • What types of scans can I perform?

You can perform passive, active, or full scans on target URLs.

  • How do I check the status of a scan?

Use the get_scan_status command with the scan ID to check its status.

  • Can I filter scan issues by severity?

Yes, you can filter issues by severity levels such as high, medium, low, info, or all.

Content

Burpsuite MCP Server

A Model Context Protocol (MCP) server that provides an interface for interacting with Burpsuite Professional's scanning and proxy functionality.

Overview

This MCP server allows AI assistants to interact with Burpsuite Professional for web security testing and vulnerability scanning. It provides tools for:

  • Starting vulnerability scans on target URLs
  • Checking scan status and retrieving results
  • Accessing HTTP/HTTPS traffic captured by Burp Proxy
  • Viewing site structure discovered during scanning

Features

Tools

The server exposes the following tools:

  1. start_scan: Start a new vulnerability scan on a target URL

    • Parameters:
      • target: Target URL to scan (e.g., https://example.com)
      • scan_type: Type of scan to perform (passive, active, or full)
  2. get_scan_status: Check the status of a running scan

    • Parameters:
      • scan_id: ID of the scan to check
  3. get_scan_issues: Get vulnerability issues found in a scan

    • Parameters:
      • scan_id: ID of the scan
      • severity: Filter issues by severity (high, medium, low, info, or all)
  4. get_proxy_history: Get HTTP/HTTPS traffic captured by Burp Proxy

    • Parameters:
      • host: Filter by host (optional)
      • method: Filter by HTTP method (optional)
      • status_code: Filter by HTTP status code (optional)
      • limit: Maximum number of items to return (default: 10)
  5. get_site_map: Get the site structure discovered during scanning and browsing

    • Parameters:
      • host: Filter by host (optional)
      • with_parameters: Only show URLs with parameters (optional)
      • limit: Maximum number of items to return (default: 20)

Resources

The server provides the following resources:

  1. Scan Results: burpsuite://scan/{scanId}
  2. Issue Details: burpsuite://scan/{scanId}/issue/{issueId}
  3. Proxy History: burpsuite://proxy/history
  4. Proxy History Item: burpsuite://proxy/history/{itemId}
  5. Site Map: burpsuite://sitemap

Installation

  1. Build the server:

    cd /path/to/burpsuite-server
    npm install
    npm run build
    
  2. Add the server to your MCP settings configuration file:

    {
      "mcpServers": {
        "burpsuite": {
          "command": "node",
          "args": ["/path/to/burpsuite-server/build/index.js"],
          "env": {},
          "disabled": false,
          "autoApprove": []
        }
      }
    }
    

Future Enhancements

This server currently provides mock functionality. To connect it to a real Burpsuite Professional instance:

  1. Configure Burpsuite Professional to expose its REST API
  2. Update the server implementation to connect to the Burpsuite REST API
  3. Add authentication mechanisms for secure API communication

Example Usage

Here are some examples of how to use the Burpsuite MCP server with an AI assistant:

Starting a Scan

Use the Burpsuite MCP server to scan example.com for vulnerabilities.

Viewing Proxy History

Show me the HTTP traffic captured by Burp Proxy for domain example.com.

Analyzing Vulnerabilities

What high severity vulnerabilities were found in the latest scan?
No tools information available.

Mirror of

image-generation mcp-server
View Details

Secure MCP server for analyzing Excel files with oletools

oletools mcp-server
View Details

Mirror of

bigquery mcp-server
View Details

MCPHubs is a website that showcases projects related to Anthropic's Model Context Protocol (MCP)

mcp mcp-server
View Details
Dealx
Dealx by DealExpress

-

dealx mcp-server
View Details

Google Analytics MCP server for accessing analytics data through tools and resources

google-analytics mcp-server
View Details

A Python-based MCP server that lets Claude run boto3 code to query and manage AWS resources. Execute powerful AWS operations directly through Claude with proper sandboxing and containerization. No need for complex setups - just pass your AWS credentials and start interacting with all AWS services.

aws mcp-server
View Details