Enables interception of Android device traffic via ADB or specific apps via Frida, facilitating deep inspection of HTTP(S) traffic and certificate pinning bypass.
Provides the capability to attach to running Clojure processes on the JVM to intercept and inspect their outgoing HTTP traffic.
Allows for attaching to running Docker containers to capture and inspect all outgoing HTTP traffic.
Enables launching Electron applications with automated HTTP interception for debugging and traffic analysis.
Supports launching Firefox instances with traffic automatically routed through the proxy for inspection and debugging.
Enables interception of specific iOS application traffic on jailbroken devices using Frida.
Provides the capability to attach to running Kotlin processes on the JVM to intercept and inspect their outgoing HTTP traffic.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@httptoolkit-mcplaunch a fresh Chrome window to intercept its traffic"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
httptoolkit-mcp
A Model Context Protocol (MCP) server that provides AI assistants with full control over HTTP Toolkit — the powerful, open-source HTTP(S) debugging proxy.
Intercept, inspect, and debug HTTP traffic from browsers, Android/iOS devices, Docker containers, JVM processes, and more — all through natural language via your AI assistant.
Features
Browser Interception — Launch Chrome or Firefox with traffic automatically routed through the proxy
Android Interception — Intercept device traffic via ADB or target specific apps with Frida (bypasses certificate pinning)
iOS Interception — Intercept specific iOS apps via Frida on jailbroken devices
Docker Interception — Attach to running Docker containers and capture all outgoing HTTP traffic
Terminal Interception — Open intercepted terminal sessions or configure existing ones
JVM Attach — Attach to running Java/Kotlin/Clojure processes
Electron Apps — Launch Electron applications with interception enabled
HTTP Client — Send HTTP requests through the proxy with full control over method, headers, and body
Server Management — Query configuration, manage interceptors, and control the server lifecycle
Prerequisites
HTTP Toolkit server running locally (default:
http://127.0.0.1:45457)Node.js >= 18
Installation
Using npx (recommended)
No installation required — just configure your MCP client:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}Global install
npm install -g httptoolkit-mcpFrom source
git clone https://github.com/fdciabdul/httptoolkit-mcp.git
cd httptoolkit-mcp
npm install
npm run buildConfiguration
Claude Code
Add to ~/.claude/settings.json or ~/.claude.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"]
}
}
}Environment Variables
Variable | Description | Default |
| HTTP Toolkit server URL |
|
| Authentication token (if server requires one) | — |
Example with environment variables:
{
"mcpServers": {
"httptoolkit": {
"command": "npx",
"args": ["-y", "httptoolkit-mcp"],
"env": {
"HTK_SERVER_URL": "http://127.0.0.1:45457",
"HTK_SERVER_TOKEN": "your-token-here"
}
}
}
}Available Tools
Server Management
Tool | Description |
| Get the HTTP Toolkit server version |
| Get proxy configuration (certificates, DNS, system proxy) |
| List all network interfaces |
| Trigger a server update check |
| Shutdown the HTTP Toolkit server |
Interceptor Management
Tool | Description |
| List all available interceptors and their status |
| Get detailed metadata for a specific interceptor |
| Generic interceptor activation with custom options |
| Deactivate a running interceptor |
Browser Interception
Tool | Description |
| Launch a fresh Chrome window with interception |
| Launch a fresh Firefox window with interception |
Terminal Interception
Tool | Description |
| Open a new terminal with interception enabled |
| Get commands to enable interception in an existing terminal |
Docker Interception
Tool | Description |
| Attach to a running Docker container |
Android Interception
Tool | Description |
| Intercept an Android device/emulator via ADB |
| Set up Frida on an Android device |
| Launch Frida server on an Android device |
| Intercept a specific Android app via Frida |
iOS Interception
Tool | Description |
| Intercept a specific iOS app via Frida |
Application Interception
Tool | Description |
| Attach to a running JVM process |
| Launch an Electron app with interception |
HTTP Client
Tool | Description |
| Send an HTTP request through the proxy |
Usage Examples
Once configured, you can ask your AI assistant things like:
"List all available interceptors"
"Intercept Chrome on port 8000"
"Show me the connected Android devices"
"Attach to the Docker container running my API"
"Send a GET request to
"Set up Frida on my Android device and intercept the target app"
"Open an intercepted terminal session"
Architecture
┌─────────────────┐ stdio ┌──────────────────┐ REST API ┌─────────────────────┐
│ AI Assistant │◄─────────────►│ httptoolkit-mcp │◄────────────►│ httptoolkit-server │
│ (Claude, etc.) │ MCP │ (this project) │ :45457 │ (HTTP Toolkit) │
└─────────────────┘ └──────────────────┘ └─────────────────────┘
│
┌────────┴────────┐
│ Mockttp Proxy │
│ :8000/45456 │
└────────┬────────┘
│
┌───────────────┼───────────────┐
│ │ │
Browsers Android/iOS Docker
Devices ContainersCredits
This project is an MCP interface for HTTP Toolkit, created by Tim Perry (@pimterry).
HTTP Toolkit — github.com/httptoolkit
HTTP Toolkit Server — github.com/httptoolkit/httptoolkit-server
Tim Perry — github.com/pimterry — Creator & maintainer of HTTP Toolkit
HTTP Toolkit is a beautiful, open-source tool for debugging, testing, and building with HTTP(S). If you find it useful, consider supporting the project.
License
Resources
Looking for Admin?
Admins can modify the Dockerfile, update the server description, and track usage metrics. If you are the server author, to access the admin panel.