Burpsuite MCP Server logo

Burpsuite MCP Server

by Cyreslab-AI

The Burpsuite MCP Server provides an interface for AI assistants to interact with Burpsuite Professional's scanning and proxy functionality. It enables automated web security testing and vulnerability scanning.

View on GitHub

Last updated: N/A

What is Burpsuite MCP Server?

This is a Model Context Protocol (MCP) server that allows AI assistants to interact with Burpsuite Professional for web security testing and vulnerability scanning. It provides tools for starting scans, checking scan status, retrieving results, accessing proxy history, and viewing site structure.

How to use Burpsuite MCP Server?

To use this server, you need to build it, add it to your MCP settings configuration file, and then use the exposed tools via an AI assistant. The server provides tools such as start_scan, get_scan_status, get_scan_issues, get_proxy_history, and get_site_map. Refer to the README for installation instructions and example usage.

Key features of Burpsuite MCP Server

  • Start vulnerability scans on target URLs

  • Check scan status and retrieve results

  • Access HTTP/HTTPS traffic captured by Burp Proxy

  • View site structure discovered during scanning

  • Exposes tools via MCP for AI assistant interaction

Use cases of Burpsuite MCP Server

  • Automated vulnerability scanning of web applications

  • Integration with AI assistants for security analysis

  • Retrieving HTTP/HTTPS traffic for analysis

  • Mapping site structure for security assessment

FAQ from Burpsuite MCP Server

How do I start a scan?

Use the start_scan tool with the target URL and scan type.

How do I check the status of a scan?

Use the get_scan_status tool with the scan ID.

How do I get the issues found in a scan?

Use the get_scan_issues tool with the scan ID and optionally filter by severity.

How do I get HTTP/HTTPS traffic captured by Burp Proxy?

Use the get_proxy_history tool with optional filters for host, method, and status code.

How do I get the site structure discovered during scanning?

Use the get_site_map tool with optional filters for host and URLs with parameters.