BurpSuite MCP Server
BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp's core functionalities.
BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp's core functionalities.
A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp's core functionalities.
# Intercept a request
curl -X POST "http://localhost:8000/proxy/intercept"
-H "Content-Type: application/json"
-d '{
"url": "https://example.com",
"method": "GET",
"headers": {"User-Agent": "Custom"},
"intercept": true
}'
# View proxy history
curl "http://localhost:8000/proxy/history"
# Start a new scan
curl -X POST "http://localhost:8000/scanner/start"
-H "Content-Type: application/json"
-d '{
"target_url": "https://example.com",
"scan_type": "active",
"scan_configurations": {
"scope": "strict",
"audit_checks": ["xss", "sqli"]
}
}'
# Check scan status
curl "http://localhost:8000/scanner/status/scan_1"
# Stop a scan
curl -X DELETE "http://localhost:8000/scanner/stop/scan_1"
# Get filtered logs
curl "http://localhost:8000/logger/logs?filter[method]=POST&filter[status_code]=200"
# Search logs
curl "http://localhost:8000/logger/logs?search=password"
# Get vulnerability analysis
curl "http://localhost:8000/logger/vulnerabilities"
# Get comprehensive analysis
curl "http://localhost:8000/logger/analysis"
# Clear logs
curl -X DELETE "http://localhost:8000/logger/clear"
curl "http://localhost:8000/logger/vulnerabilities/severity"
Automatically detects multiple types of vulnerabilities: - ? XSS (Cross-Site Scripting) - ? SQL Injection - ?️ Path Traversal - ? File Inclusion - ? SSRF (Server-Side Request Forgery) - ? XXE (XML External Entity) - ? CSRF (Cross-Site Request Forgery) - ? Open Redirect - ⚡ Command Injection
git clone https://github.com/X3r0K/BurpSuite-MCP-Server.git
cd BurpSuite-MCP-Server
Install Dependencies
pip install -r requirements.txt
Configure Environment
# Copy .env.example to .env
cp .env.example .env
# Update the values in .env
BURP_API_KEY=Your_API_KEY
BURP_API_HOST=localhost
BURP_API_PORT=1337
BURP_PROXY_HOST=127.0.0.1
BURP_PROXY_PORT=8080
MCP_SERVER_HOST=0.0.0.0
MCP_SERVER_PORT=8000
Start the Server
python main.py
The server will start on http://localhost:8000
For detailed API documentation, visit:
- Swagger UI: http://localhost:8000/docs
- ReDoc: http://localhost:8000/redoc
The MCP server is configured to work seamlessly with Cursor IDE. The .cursor
directory contains all necessary configuration files:
settings.json
: Contains MCP server configurationPython interpreter path
tasks.json
: Defines common tasks
Check Vulnerabilities
launch.json
: Contains debugging configurations
The server will be accessible at http://localhost:8000
with the following endpoints:
- /proxy/intercept
for request interception
- /logger
for logging functionality
- /logger/vulnerabilities/severity
for vulnerability analysis
This project is licensed under the MIT License - see the LICENSE file for details.