Skip to main content
Glama

httptoolkit-mcp

A Model Context Protocol (MCP) server that provides AI assistants with full control over HTTP Toolkit — the powerful, open-source HTTP(S) debugging proxy.

Intercept, inspect, and debug HTTP traffic from browsers, Android/iOS devices, Docker containers, JVM processes, and more — all through natural language via your AI assistant.

Features

  • Browser Interception — Launch Chrome or Firefox with traffic automatically routed through the proxy

  • Android Interception — Intercept device traffic via ADB or target specific apps with Frida (bypasses certificate pinning)

  • iOS Interception — Intercept specific iOS apps via Frida on jailbroken devices

  • Docker Interception — Attach to running Docker containers and capture all outgoing HTTP traffic

  • Terminal Interception — Open intercepted terminal sessions or configure existing ones

  • JVM Attach — Attach to running Java/Kotlin/Clojure processes

  • Electron Apps — Launch Electron applications with interception enabled

  • HTTP Client — Send HTTP requests through the proxy with full control over method, headers, and body

  • Server Management — Query configuration, manage interceptors, and control the server lifecycle

Prerequisites

  • HTTP Toolkit server running locally (default: http://127.0.0.1:45457)

  • Node.js >= 18

Installation

No installation required — just configure your MCP client:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Global install

npm install -g httptoolkit-mcp

From source

git clone https://github.com/fdciabdul/httptoolkit-mcp.git
cd httptoolkit-mcp
npm install
npm run build

Configuration

Claude Code

Add to ~/.claude/settings.json or ~/.claude.json:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"]
    }
  }
}

Environment Variables

Variable

Description

Default

HTK_SERVER_URL

HTTP Toolkit server URL

http://127.0.0.1:45457

HTK_SERVER_TOKEN

Authentication token (if server requires one)

Example with environment variables:

{
  "mcpServers": {
    "httptoolkit": {
      "command": "npx",
      "args": ["-y", "httptoolkit-mcp"],
      "env": {
        "HTK_SERVER_URL": "http://127.0.0.1:45457",
        "HTK_SERVER_TOKEN": "your-token-here"
      }
    }
  }
}

Available Tools

Server Management

Tool

Description

get_version

Get the HTTP Toolkit server version

get_config

Get proxy configuration (certificates, DNS, system proxy)

get_network_interfaces

List all network interfaces

trigger_update

Trigger a server update check

shutdown_server

Shutdown the HTTP Toolkit server

Interceptor Management

Tool

Description

list_interceptors

List all available interceptors and their status

get_interceptor_metadata

Get detailed metadata for a specific interceptor

activate_interceptor

Generic interceptor activation with custom options

deactivate_interceptor

Deactivate a running interceptor

Browser Interception

Tool

Description

intercept_chrome

Launch a fresh Chrome window with interception

intercept_firefox

Launch a fresh Firefox window with interception

Terminal Interception

Tool

Description

intercept_fresh_terminal

Open a new terminal with interception enabled

intercept_existing_terminal

Get commands to enable interception in an existing terminal

Docker Interception

Tool

Description

intercept_docker_container

Attach to a running Docker container

Android Interception

Tool

Description

intercept_android_adb

Intercept an Android device/emulator via ADB

frida_android_setup

Set up Frida on an Android device

frida_android_launch

Launch Frida server on an Android device

frida_android_intercept

Intercept a specific Android app via Frida

iOS Interception

Tool

Description

frida_ios_intercept

Intercept a specific iOS app via Frida

Application Interception

Tool

Description

intercept_jvm

Attach to a running JVM process

intercept_electron

Launch an Electron app with interception

HTTP Client

Tool

Description

send_http_request

Send an HTTP request through the proxy

Usage Examples

Once configured, you can ask your AI assistant things like:

  • "List all available interceptors"

  • "Intercept Chrome on port 8000"

  • "Show me the connected Android devices"

  • "Attach to the Docker container running my API"

  • "Send a GET request to

  • "Set up Frida on my Android device and intercept the target app"

  • "Open an intercepted terminal session"

Architecture

┌─────────────────┐     stdio      ┌──────────────────┐    REST API    ┌─────────────────────┐
│   AI Assistant   │◄─────────────►│  httptoolkit-mcp  │◄────────────►│  httptoolkit-server  │
│ (Claude, etc.)   │     MCP       │   (this project)  │   :45457     │     (HTTP Toolkit)   │
└─────────────────┘               └──────────────────┘               └─────────────────────┘
                                                                              │
                                                                     ┌────────┴────────┐
                                                                     │  Mockttp Proxy   │
                                                                     │   :8000/45456    │
                                                                     └────────┬────────┘
                                                                              │
                                                              ┌───────────────┼───────────────┐
                                                              │               │               │
                                                         Browsers       Android/iOS      Docker
                                                                        Devices        Containers

Credits

This project is an MCP interface for HTTP Toolkit, created by Tim Perry (@pimterry).

HTTP Toolkit is a beautiful, open-source tool for debugging, testing, and building with HTTP(S). If you find it useful, consider supporting the project.

License

MIT

Install Server
A
security – no known vulnerabilities
A
license - permissive license
A
quality - confirmed to work

Resources

Looking for Admin?

Admins can modify the Dockerfile, update the server description, and track usage metrics. If you are the server author, to access the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/fdciabdul/httptoolkit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server