MCP Catalogs
Hometoolbox screenshot

toolbox

by go-appsec·24·Score 43

MCP-based application security testing tools that enable collaboration between humans and coding agents via CLI and proxy.

securitydeveloper-toolsai-llm
5
Forks
3
Open issues
this month
Last commit
2d ago
Indexed

Overview

Sectool is a collaborative workbench for application security testing that bridges the gap between human strengths in UI interaction and authentication, and agent capabilities in traffic analysis and mutation. The tool provides a wire-fidelity HTTP proxy (similar to Burp) that captures all browser traffic, while exposing MCP tools that allow AI agents to query flows, replay modified requests, crawl endpoints, test for out-of-band interactions, and detect reflections. This approach combines human expertise with AI automation to make security testing more thorough and less likely to miss subtle indicators.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Collaborative application security testing where humans handle authentication and UI interactions while AI analyzes traffic
you:Web application penetration testing with AI assistance for request manipulation and vulnerability detection
you:Security validation of specific vulnerability reports by replaying and modifying captured requests
you:How is this different from traditional security scanners?
you:Can I use this with Burp Suite?

When to choose this

Choose this MCP server when you need collaborative application security testing that combines human UI interaction with AI-powered traffic analysis and mutation.

When NOT to choose this

Don't choose this if you need standalone scanning without human involvement, or if you're already deeply integrated with Burp Suite and prefer its workflow.

Tools this server exposes

12 tools extracted from the README
  • workflow

    Select the appropriate workflow mode for security testing

  • proxy_summary

    Review summary of captured proxy traffic

  • replay_send

    Replay a captured request with modifications

  • crawl_create

    Create a crawling session to discover endpoints

  • oast_create

    Set up out-of-band interaction testing session

  • diff

    Compare two flows to identify differences

  • reflected

    Detect request parameters reflected in responses

  • jwt

    Inspect and decode JWT tokens

  • oast_poll

    Poll OAST session for callbacks

  • notes_save

    Save observations linked to flows

  • notes_list

    List all saved notes

  • proxy_cookies

    Inspect cookies from captured traffic

Comparable tools

zap-mcpburp-mcpowasp-zapburp-suite

Installation

Installation

**Via Go:**

go install github.com/go-appsec/toolbox/sectool@latest

**Binary Downloads:** Download pre-built binaries for Linux, macOS, Windows (amd64 and arm64) from the [latest release](https://github.com/go-appsec/toolbox/releases).

Setup

  1. Start the MCP server:
sectool mcp
  1. Configure browser to use proxy (127.0.0.1:8080)
  2. Install CA certificate from ~/.sectool/ca.pem

Claude Desktop Configuration

{
  "mcpServers": {
    "sectool": {
      "command": "sectool",
      "args": ["mcp"]
    }
  }
}

FAQ

How is this different from traditional security scanners?
Sectool is not a scanner but a collaborative workbench. It combines human expertise in handling authentication and UI interactions with AI capabilities for traffic analysis, making testing more thorough for complex applications.
Can I use this with Burp Suite?
Yes. Sectool can integrate with Burp Suite either by using Burp as the proxy frontend while running the MCP server, or by using the Burp MCP extension as a GUI to review the agent's actions.

Compare toolbox with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.