by PortSwigger
Enables Burp Suite to communicate with AI clients via the Model Context Protocol, providing an MCP server and bundled stdio proxy.
Enables Burp Suite to expose a Model Context Protocol (MCP) endpoint that AI clients can call, turning Burp into an interactive tool for automated testing, analysis, and response generation.
jar
command is available../gradlew embedProxyJar
. The JAR build/libs/burp-mcp-all.jar
is generated.http://127.0.0.1:9876
).http://127.0.0.1:9876
or .../sse
). For stdio‑only clients, use the packaged mcp-proxy-all.jar
with --sse-url
pointing to the Burp server.mcp-proxy-all.jar
) to bridge SSE‑only clients.Tools.kt
that the AI can invoke.Q: Do I need a separate server to run the MCP endpoint? A: No. The MCP server runs inside Burp as a Java extension.
Q: Can I change the listening port? A: Yes, the MCP tab lets you specify a custom host and port.
Q: My AI client only supports stdio MCP servers—what should I do?
A: Use the bundled mcp-proxy-all.jar
. Run it with java -jar mcp-proxy-all.jar --sse-url http://127.0.0.1:9876
and point the client to the proxy executable.
Q: How do I add new tools for the AI to use?
A: Create a serializable Kotlin data class in src/main/kotlin/net/portswigger/mcp/tools/Tools.kt
. The class name becomes the tool name; provide a description and implement the required interface.
Q: Is any special licensing required? A: The repository is open source; follow the license file included in the project.
Integrate Burp Suite with AI Clients using the Model Context Protocol (MCP).
For more information about the protocol visit: modelcontextprotocol.io
Ensure that the following prerequisites are met before building and installing the extension:
java --version
in your terminal.jar
command must be executable and available in your system's PATH. You can verify this by running jar --version
in your terminal. This is required for building and installing the extension.Clone the Repository: Obtain the source code for the MCP Server Extension.
git clone https://github.com/PortSwigger/mcp-server.git
Navigate to the Project Directory: Move into the project's root directory.
cd burp-mcp
Build the JAR File: Use Gradle to build the extension.
./gradlew embedProxyJar
This command compiles the source code and packages it into a JAR file located in build/libs/burp-mcp-all.jar
.
Extensions
tab.Add
.Extension Type
to Java
.Select file ...
and choose the JAR file built in the previous step.Next
to load the extension.Upon successful loading, the MCP Server Extension will be active within Burp Suite.
Configuration for the extension is done through the Burp Suite UI in the MCP
tab.
Enabled
checkbox controls whether the MCP server is active.Enable tools that can edit your config
checkbox allows the MCP server to expose tools which can edit Burp configuration files.http://127.0.0.1:9876
.To fully utilize the MCP Server Extension with Claude, you need to configure your Claude client settings appropriately. The extension has an installer which will automatically configure the client settings for you.
Currently, Claude Desktop only support STDIO MCP Servers
for the service it needs.
This approach isn't ideal for desktop apps like Burp, so instead, Claude will start a proxy server that points to the
Burp instance,
which hosts a web server at a known port (localhost:9876
).
Configure Claude to use the Burp MCP server
You can do this in one of two ways:
Option 1: Run the installer from the extension This will add the Burp MCP server to the Claude Desktop config.
Option 2: Manually edit the config file
Open the file located at ~/Library/Application Support/Claude/claude_desktop_config.json
,
and replace or update it with the following:
{
"mcpServers": {
"burp": {
"command": "<path to Java executable packaged with Burp>",
"args": [
"-jar",
"/path/to/mcp/proxy/jar/mcp-proxy-all.jar",
"--sse-url",
"<your Burp MCP server URL configured in the extension>"
]
}
}
}
Restart Claude Desktop - assuming Burp is running with the extension loaded.
If you want to install the MCP server manually you can either use the extension's SSE server directly or the packaged Stdio proxy server.
In order to use the SSE server directly you can just provide the url for the server in your client's configuration. Depending
on your client and your configuration in the extension this may be with or without the /sse
path.
http://127.0.0.1:9876
or
http://127.0.0.1:9876/sse
The source code for the proxy server can be found here: MCP Proxy Server
In order to support MCP Clients which only support Stdio MCP Servers, the extension comes packaged with a proxy server for passing requests to the SSE MCP server extension.
If you want to use the Stdio proxy server you can use the extension's installer option to extract the proxy server jar. Once you have the jar you can add the following command and args to your client configuration:
/path/to/packaged/burp/java -jar /path/to/proxy/jar/mcp-proxy-all.jar --sse-url http://127.0.0.1:9876
Tools are defined in src/main/kotlin/net/portswigger/mcp/tools/Tools.kt
. To define new tools, create a new serializable
data class with the required parameters which will come from the LLM.
The tool name is auto-derived from its parameters data class. A description is also needed for the LLM. You can return a string (or richer PromptMessageContents) to provide data back to the LLM.
Extend the Paginated interface to add auto-pagination support.
Please log in to share your review and rating for this MCP.
Explore related MCPs that share similar capabilities and solve comparable challenges
by chaitin
A self‑hosted web application firewall and reverse proxy that protects web applications from attacks and exploits by filtering, monitoring, and blocking malicious HTTP/S traffic.
by cycodehq
Boost security in the development lifecycle via SAST, SCA, secrets, and IaC scanning.
by ChristophEnglisch
Provides AI‑powered administration of Keycloak users and realms through the Model Context Protocol, enabling automated creation, deletion, and listing of users and realms from MCP clients such as Claude Desktop.
by Spathodea-Network
Provides a Model Context Protocol server that enables querying and retrieving threat intelligence data from OpenCTI through a standardized interface.
by firstorderai
Provides seamless access to two‑factor authentication codes and passwords for AI agents, enabling automated login while maintaining security.
by vespo92
Manage OPNsense firewalls through conversational AI, providing network configuration, device discovery, DNS filtering, HAProxy setup, and backup/restore via simple commands.
by mytechnotalent
Provides an AI-driven interface to Malware Bazaar, delivering real-time threat intelligence and sample metadata for authorized cybersecurity research workflows.
by co-browser
Verify that any MCP server is running the intended and untampered code via hardware attestation.
by Hexix23
Provides a powerful interface to the Shodan API, enabling advanced search, host intelligence, vulnerability discovery, and network mapping for security research.