toolbox
by go-appsec·★ 24·Score 43
MCP-based application security testing tools that enable collaboration between humans and coding agents via CLI and proxy.
Overview
Sectool is a collaborative workbench for application security testing that bridges the gap between human strengths in UI interaction and authentication, and agent capabilities in traffic analysis and mutation. The tool provides a wire-fidelity HTTP proxy (similar to Burp) that captures all browser traffic, while exposing MCP tools that allow AI agents to query flows, replay modified requests, crawl endpoints, test for out-of-band interactions, and detect reflections. This approach combines human expertise with AI automation to make security testing more thorough and less likely to miss subtle indicators.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose this MCP server when you need collaborative application security testing that combines human UI interaction with AI-powered traffic analysis and mutation.
When NOT to choose this
Don't choose this if you need standalone scanning without human involvement, or if you're already deeply integrated with Burp Suite and prefer its workflow.
Tools this server exposes
12 tools extracted from the READMEworkflowSelect the appropriate workflow mode for security testing
proxy_summaryReview summary of captured proxy traffic
replay_sendReplay a captured request with modifications
crawl_createCreate a crawling session to discover endpoints
oast_createSet up out-of-band interaction testing session
diffCompare two flows to identify differences
reflectedDetect request parameters reflected in responses
jwtInspect and decode JWT tokens
oast_pollPoll OAST session for callbacks
notes_saveSave observations linked to flows
notes_listList all saved notes
proxy_cookiesInspect cookies from captured traffic
Comparable tools
Installation
Installation
**Via Go:**
go install github.com/go-appsec/toolbox/sectool@latest**Binary Downloads:** Download pre-built binaries for Linux, macOS, Windows (amd64 and arm64) from the [latest release](https://github.com/go-appsec/toolbox/releases).
Setup
- Start the MCP server:
sectool mcp- Configure browser to use proxy (127.0.0.1:8080)
- Install CA certificate from ~/.sectool/ca.pem
Claude Desktop Configuration
{
"mcpServers": {
"sectool": {
"command": "sectool",
"args": ["mcp"]
}
}
}FAQ
- How is this different from traditional security scanners?
- Sectool is not a scanner but a collaborative workbench. It combines human expertise in handling authentication and UI interactions with AI capabilities for traffic analysis, making testing more thorough for complex applications.
- Can I use this with Burp Suite?
- Yes. Sectool can integrate with Burp Suite either by using Burp as the proxy frontend while running the MCP server, or by using the Burp MCP extension as a GUI to review the agent's actions.
Compare toolbox with
Last updated · Auto-generated from public README + GitHub signals.