Burpsuite MCP Server
by Cyreslab-AI
The Burpsuite MCP Server provides an interface for AI assistants to interact with Burpsuite Professional's scanning and proxy functionality. It enables automated web security testing and vulnerability scanning.
Last updated: N/A
What is Burpsuite MCP Server?
This is a Model Context Protocol (MCP) server that allows AI assistants to interact with Burpsuite Professional for web security testing and vulnerability scanning. It provides tools for starting scans, checking scan status, retrieving results, accessing proxy history, and viewing site structure.
How to use Burpsuite MCP Server?
To use this server, you need to build it, add it to your MCP settings configuration file, and then use the exposed tools via an AI assistant. The server provides tools such as start_scan
, get_scan_status
, get_scan_issues
, get_proxy_history
, and get_site_map
. Refer to the README for installation instructions and example usage.
Key features of Burpsuite MCP Server
Start vulnerability scans on target URLs
Check scan status and retrieve results
Access HTTP/HTTPS traffic captured by Burp Proxy
View site structure discovered during scanning
Exposes tools via MCP for AI assistant interaction
Use cases of Burpsuite MCP Server
Automated vulnerability scanning of web applications
Integration with AI assistants for security analysis
Retrieving HTTP/HTTPS traffic for analysis
Mapping site structure for security assessment
FAQ from Burpsuite MCP Server
How do I start a scan?
How do I start a scan?
Use the start_scan
tool with the target URL and scan type.
How do I check the status of a scan?
How do I check the status of a scan?
Use the get_scan_status
tool with the scan ID.
How do I get the issues found in a scan?
How do I get the issues found in a scan?
Use the get_scan_issues
tool with the scan ID and optionally filter by severity.
How do I get HTTP/HTTPS traffic captured by Burp Proxy?
How do I get HTTP/HTTPS traffic captured by Burp Proxy?
Use the get_proxy_history
tool with optional filters for host, method, and status code.
How do I get the site structure discovered during scanning?
How do I get the site structure discovered during scanning?
Use the get_site_map
tool with optional filters for host and URLs with parameters.