loading…
Search for a command to run...
loading…
An MCP server that enables AI assistants to control HTTP Toolkit for intercepting, inspecting, and debugging HTTP(S) traffic from browsers, mobile devices, and
An MCP server that enables AI assistants to control HTTP Toolkit for intercepting, inspecting, and debugging HTTP(S) traffic from browsers, mobile devices, and Docker containers. It provides tools for server management, interceptor activation, and sending HTTP requests through natural language commands.
A Model Context Protocol (MCP) server that provides AI assistants with full control over HTTP Toolkit — the powerful, open-source HTTP(S) debugging proxy.
Intercept, inspect, and debug HTTP traffic from browsers, Android/iOS devices, Docker containers, JVM processes, and more — all through natural language via your AI assistant.
No installation required — just configure your MCP client:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
npm install -g httptoolkit-mcp
git clone https://github.com/fdciabdul/httptoolkit-mcp.git
cd httptoolkit-mcp
npm install
npm run build
Add to ~/.claude/settings.json or ~/.claude.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
Add to your claude_desktop_config.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}
| Variable | Description | Default |
|---|---|---|
HTK_SERVER_URL |
HTTP Toolkit management API URL | http://127.0.0.1:45457 |
HTK_SERVER_TOKEN |
Auth token (auto-detected from desktop app) | Auto-detected |
HTK_ADMIN_URL |
Mockttp admin API URL | http://127.0.0.1:45456 |
Note: When using the HTTP Toolkit desktop app, the auth token is automatically detected from the running process — no manual configuration needed.
Example with manual environment variables:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"],
"env": {
"HTK_SERVER_URL": "http://127.0.0.1:45457",
"HTK_SERVER_TOKEN": "your-token-here"
}
}
}
}
| Tool | Description |
|---|---|
capture_traffic |
Capture live intercepted HTTP traffic with full request/response bodies. Subscribes to the active HTTP Toolkit session via WebSocket. Supports auto-detection or manual session ID. |
| Tool | Description |
|---|---|
get_version |
Get the HTTP Toolkit server version |
get_config |
Get proxy configuration (certificates, DNS, system proxy) |
get_network_interfaces |
List all network interfaces |
trigger_update |
Trigger a server update check |
shutdown_server |
Shutdown the HTTP Toolkit server |
| Tool | Description |
|---|---|
list_interceptors |
List all available interceptors and their status |
get_interceptor_metadata |
Get detailed metadata for a specific interceptor |
activate_interceptor |
Generic interceptor activation with custom options |
deactivate_interceptor |
Deactivate a running interceptor |
| Tool | Description |
|---|---|
intercept_chrome |
Launch a fresh Chrome window with interception |
intercept_firefox |
Launch a fresh Firefox window with interception |
| Tool | Description |
|---|---|
intercept_fresh_terminal |
Open a new terminal with interception enabled |
intercept_existing_terminal |
Get commands to enable interception in an existing terminal |
| Tool | Description |
|---|---|
intercept_docker_container |
Attach to a running Docker container |
| Tool | Description |
|---|---|
intercept_android_adb |
Intercept an Android device/emulator via ADB |
frida_android_setup |
Set up Frida on an Android device |
frida_android_launch |
Launch Frida server on an Android device |
frida_android_intercept |
Intercept a specific Android app via Frida |
| Tool | Description |
|---|---|
frida_ios_intercept |
Intercept a specific iOS app via Frida |
| Tool | Description |
|---|---|
intercept_jvm |
Attach to a running JVM process |
intercept_electron |
Launch an Electron app with interception |
| Tool | Description |
|---|---|
send_http_request |
Send an HTTP request through the proxy |
Once configured, you can ask your AI assistant things like:
User: "Capture traffic from my browser for 5 seconds"
capture_traffic({ duration: 5, sessionId: "2474b580-482e-4a79-8488-121583d466e1" })
Result:
{
"capturedExchanges": 2,
"exchanges": [
{
"request": {
"method": "GET",
"url": "https://api.example.com/users",
"headers": { "host": "api.example.com", ... },
},
"response": {
"statusCode": 200,
"headers": { "content-type": "application/json", ... },
"body": "[{\"id\": 1, \"name\": \"John\"}]"
}
}
]
}
┌─────────────────┐ stdio ┌──────────────────┐ REST API ┌─────────────────────┐
│ AI Assistant │◄─────────────►│ httptoolkit-mcp │◄────────────►│ httptoolkit-server │
│ (Claude, etc.) │ MCP │ (this project) │ :45457 │ (HTTP Toolkit) │
└─────────────────┘ └──────────────────┘ └─────────────────────┘
│ │
│ WebSocket ┌────────┴────────┐
│ (traffic capture) │ Mockttp Proxy │
└──────────────────────────►│ :45456 (admin) │
│ :8000 (proxy) │
└────────┬────────┘
│
┌───────────────┼───────────────┐
│ │ │
Browsers Android/iOS Docker
Devices Containers
This project is an MCP interface for HTTP Toolkit, created by Tim Perry (@pimterry).
HTTP Toolkit is a beautiful, open-source tool for debugging, testing, and building with HTTP(S). If you find it useful, consider supporting the project.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"httptoolkit-mcp": {
"command": "npx",
"args": []
}
}
}PRs, issues, code search, CI status
Database, auth and storage
Reference / test server with prompts, resources, and tools.
Secure file operations with configurable access controls.