Skip to content

SnailSploit/Burp-MCP-Security-Analysis-Toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Burp MCP Security Analysis Toolkit

License: MIT Platform Claude Code

A skills-based security analysis framework that combines Burp Suite's traffic capture with Claude Code's reasoning via MCP (Model Context Protocol). Instead of ad-hoc prompts, this toolkit encodes expert penetration testing methodology into reusable skill files.

Architecture Diagram

🎯 Philosophy

Principle Description
Skills over Prompts Expert methodology encoded in skill files, not thrown-together prompts
Phased Analysis Scope β†’ Triage β†’ Analyze β†’ Report (not everything at once)
Evidence-Required No finding without proof from actual HTTP traffic

πŸš€ Quick Start

Installation (macOS)

# Clone the repository
git clone https://github.com/yourusername/burp-mcp-toolkit.git
cd burp-mcp-toolkit

# Run the installer
chmod +x install.sh
./install.sh

# Configure your scope
cp templates/scope-template.yaml scope.yaml
# Edit scope.yaml with your target information

# Launch
./launch.sh

Manual Installation

See Installation Guide below for step-by-step manual setup.

Usage

Once Burp Suite is running with MCP enabled:

# In Claude Code:
"load scope"      # Validate configuration
"triage"          # Classify endpoints  
"analyze all"     # Run all indicator tests
"report"          # Generate final report

πŸ“ Directory Structure

burp-mcp-toolkit/
β”œβ”€β”€ CLAUDE.md                    # Orchestration instructions (auto-loaded)
β”œβ”€β”€ README.md                    # This file
β”œβ”€β”€ install.sh                   # macOS installer
β”œβ”€β”€ launch.sh                    # Launcher script (created by installer)
β”œβ”€β”€ scope.yaml                   # Your engagement config (create from template)
β”‚
β”œβ”€β”€ skills/                      # 🧠 Methodology files (~80KB of expertise)
β”‚   β”œβ”€β”€ SKILL-burp-mcp.md        # MCP query patterns
β”‚   β”œβ”€β”€ SKILL-endpoint-triage.md # Endpoint classification
β”‚   β”œβ”€β”€ SKILL-idor-testing.md    # IDOR detection methodology
β”‚   β”œβ”€β”€ SKILL-bola-testing.md    # Broken Object Level Authorization
β”‚   β”œβ”€β”€ SKILL-auth-analysis.md   # Auth bypass testing
β”‚   β”œβ”€β”€ SKILL-ssrf-testing.md    # SSRF detection
β”‚   β”œβ”€β”€ SKILL-injection-points.md# SQLi/XSS vector identification
β”‚   └── SKILL-report-format.md   # Report generation format
β”‚
β”œβ”€β”€ lib/                         # 🐍 Python helpers
β”‚   β”œβ”€β”€ scope_validator.py       # Validate scope.yaml
β”‚   β”œβ”€β”€ endpoint_filter.py       # Filter/prioritize endpoints
β”‚   β”œβ”€β”€ finding_formatter.py     # Format findings to markdown
β”‚   └── report_generator.py      # Aggregate findings into report
β”‚
β”œβ”€β”€ templates/
β”‚   β”œβ”€β”€ scope-template.yaml      # Blank scope configuration
β”‚   └── finding-template.md      # Finding documentation format
β”‚
└── output/                      # πŸ“Š Generated during analysis
    β”œβ”€β”€ endpoints.json           # Triaged endpoint list
    β”œβ”€β”€ findings/                # Per-indicator findings
    └── report.md                # Final consolidated report

πŸ” Supported Indicators

Indicator Skill File What It Finds
idor SKILL-idor-testing.md Insecure Direct Object References
bola SKILL-bola-testing.md Broken Object Level Authorization
auth_bypass SKILL-auth-analysis.md Authentication/session vulnerabilities
ssrf SKILL-ssrf-testing.md Server-Side Request Forgery
injection SKILL-injection-points.md SQLi/XSS/Command injection vectors

πŸ’» Commands Reference

Command Phase Description
load scope 1 Parse and validate scope.yaml
triage 2 Classify and prioritize endpoints
analyze {indicator} 3 Run specific indicator (e.g., analyze idor)
analyze all 3 Run all enabled indicators
report 4 Generate consolidated report
full scan 1-4 Run complete pipeline
status - Show current progress
show endpoints - Display triaged endpoints
inspect {path} - Deep dive on specific endpoint

πŸ“‹ Prerequisites

  • macOS (Intel or Apple Silicon)
  • Burp Suite Community or Professional
  • Claude Code (npm package)
  • Captured HTTP Traffic through Burp proxy
  • Multiple auth contexts (for IDOR/BOLA testing)

πŸ”§ Installation Guide

Option 1: Automated (Recommended)

./install.sh

This installs: Homebrew, Burp Suite, Caddy, Node.js, Claude Code, and configures MCP.

Option 2: Manual

  1. Install Burp Suite

    brew install --cask burp-suite
  2. Install MCP Server Extension

    • Open Burp β†’ Extender β†’ BApp Store
    • Search "MCP Server" β†’ Install
    • Export mcp-proxy.jar to ~/.burp-mcp-extension/
  3. Install Caddy (reverse proxy)

    brew install caddy
  4. Install Claude Code

    npm install -g @anthropic-ai/claude-code
  5. Configure MCP

    Create ~/.claude.json:

    {
      "mcpServers": {
        "burp": {
          "command": "/path/to/java",
          "args": ["-jar", "/path/to/mcp-proxy.jar", "--", "http://localhost:9877/mcp"]
        }
      }
    }
  6. Configure Caddy

    Create ~/.config/caddy/Caddyfile:

    :9877 {
        reverse_proxy localhost:9876 {
            header_up -Origin
        }
    }
    

πŸ›‘οΈ Configuration

Copy and edit the scope template:

cp templates/scope-template.yaml scope.yaml

Key sections:

  • target: Primary domain and additional hosts
  • scope: Include/exclude path patterns
  • indicators: Which vulnerability types to test
  • auth: Multi-user tokens for IDOR/BOLA testing

See templates/scope-template.yaml for full documentation with examples.

πŸ“Š Output

All findings are written to output/:

File Description
endpoints.json Triaged endpoints with scores and indicators
findings/idor.md IDOR-specific findings
findings/bola.md BOLA-specific findings
findings/auth.md Auth bypass findings
findings/ssrf.md SSRF findings
findings/injection.md Injection point findings
report.md Consolidated final report

🐍 Python Helpers

The lib/ directory contains standalone Python utilities:

# Validate scope configuration
python lib/scope_validator.py scope.yaml

# Generate report from findings
python lib/report_generator.py output/

✏️ Extending

Add New Indicator

  1. Create skills/SKILL-{indicator}-testing.md with methodology
  2. Add to indicators.enabled in scope-template.yaml
  3. Update CLAUDE.md with new skill reference

Custom Skills

Follow the structure of existing skills:

  • Purpose and scope
  • Prerequisites
  • Step-by-step methodology
  • Evidence requirements
  • Output format

πŸ”’ Security Notes

  • Scope files contain tokens - Add scope.yaml to .gitignore
  • Use only on authorized targets - Standard pentest rules apply
  • Evidence is redacted by default - Configure in scope.yaml

πŸ“„ License

MIT License - See LICENSE

🀝 Contributing

Contributions welcome! See CONTRIBUTING.md

πŸ“š Related Projects


Disclaimer: Use responsibly and only on systems you have explicit permission to test.

About

Burp MCP Security Analysis Toolkit

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published