
Burpsuite
STDIOMCP server for Burpsuite Professional web security testing and vulnerability scanning
MCP server for Burpsuite Professional web security testing and vulnerability scanning
A Model Context Protocol (MCP) server that provides an interface for interacting with Burpsuite Professional's scanning and proxy functionality.
This MCP server allows AI assistants to interact with Burpsuite Professional for web security testing and vulnerability scanning. It provides tools for:
The server exposes the following tools:
start_scan: Start a new vulnerability scan on a target URL
target
: Target URL to scan (e.g., https://example.com)scan_type
: Type of scan to perform (passive, active, or full)get_scan_status: Check the status of a running scan
scan_id
: ID of the scan to checkget_scan_issues: Get vulnerability issues found in a scan
scan_id
: ID of the scanseverity
: Filter issues by severity (high, medium, low, info, or all)get_proxy_history: Get HTTP/HTTPS traffic captured by Burp Proxy
host
: Filter by host (optional)method
: Filter by HTTP method (optional)status_code
: Filter by HTTP status code (optional)limit
: Maximum number of items to return (default: 10)get_site_map: Get the site structure discovered during scanning and browsing
host
: Filter by host (optional)with_parameters
: Only show URLs with parameters (optional)limit
: Maximum number of items to return (default: 20)The server provides the following resources:
burpsuite://scan/{scanId}
burpsuite://scan/{scanId}/issue/{issueId}
burpsuite://proxy/history
burpsuite://proxy/history/{itemId}
burpsuite://sitemap
To install Burpsuite Server for Claude Desktop automatically via Smithery:
npx -y @smithery/cli install @Cyreslab-AI/burpsuite-mcp-server --client claude
Build the server:
cd /path/to/burpsuite-server npm install npm run build
Add the server to your MCP settings configuration file:
{ "mcpServers": { "burpsuite": { "command": "node", "args": ["/path/to/burpsuite-server/build/index.js"], "env": {}, "disabled": false, "autoApprove": [] } } }
This server currently provides mock functionality. To connect it to a real Burpsuite Professional instance:
Here are some examples of how to use the Burpsuite MCP server with an AI assistant:
Use the Burpsuite MCP server to scan example.com for vulnerabilities.
Show me the HTTP traffic captured by Burp Proxy for domain example.com.
What high severity vulnerabilities were found in the latest scan?