JsHookMcp
Provides a bridge for Burp Suite, enabling integration with the Burp Suite security testing platform for network interception and analysis.
Provides GraphQL introspection capabilities for analyzing and querying GraphQL APIs.
@jshookmcp/jshook
English | δΈζ
An MCP (Model Context Protocol) server with a runtime-registry-driven catalog of built-in tools for AI-assisted JavaScript analysis and security analysis. It combines browser automation, Chrome DevTools Protocol debugging, network monitoring, intelligent JavaScript hooks, LLM-powered code analysis, process and memory inspection, WASM tooling, source-map reconstruction, AST transforms, and composite workflows in a single server.
Documentation / Quick Links
π Quick Start
Use jshookmcp instantly with Claude Desktop or Cursor without installing anything globally.
Claude Desktop Configuration (claude_desktop_config.json):
{
"mcpServers": {
"jshook": {
"command": "npx",
"args": ["-y", "@jshookmcp/jshook@latest"],
"env": {
"JSHOOK_BASE_PROFILE": "search"
}
}
}
}(Note for Windows users: If npx is not found, specify the absolute path to npx.cmd)
π Key Highlights
π€ AI-Driven Analysis: Leverage LLMs for intelligent JavaScript deobfuscation, cryptographic algorithm detection, and AST-level code comprehension.
β‘ Search-First Context Efficiency: BM25-powered
search_tools+ dynamic boosts cut jshook's tool-schema init delta from ~40.0K+ tokens (full) to ~3.0K (search) (Claude server-side count; excludes Claude Code base prompt).π― Progressive Capability Tiers: Three built-in profiles (
search/workflow/full), withsearchas the default base tier for on-demand capability scaling.π Full-Stack Automation: Seamlessly orchestrate Chromium/Camoufox browsers, CDP debugging, and network interception as atomic actions.
π‘οΈ Advanced Anti-Debug: Built-in evasion for debugger statements, timing checks, and strict headless bot fingerprinting techniques.
π§© Dynamic Extensibility: Hot-reload plugins and workflows from local directories without recompiling the core server.
π§ Zero-Wiring Extensibility: Auto-discovered domains via
manifest.ts, lazy handler instantiation, and B-Skeleton contracts for plugins/workflows.π οΈ Reverse Engineering Toolchain: Integrated WASM disassembly, binary entropy analysis, in-memory scanning, and bridges for Burp Suite/Ghidra/IDA Pro.
π‘οΈ Core Capabilities
JSHookMCP exposes 360+ atomic tools across 36 domains, empowering AI orchestrators with unparalleled capabilities:
πΈοΈ Browser Automation & Reverse Engineering: Zero-config Chromium/Camoufox injection, CDP (Chrome DevTools Protocol) orchestration, and iframe evaluation bypasses.
π‘ Network Interception & Spoofing: Deep HTTP/2 frame building, MiTM traffic capture, GraphQL introspection, and Burp Suite bridge.
π§ AST & Semantic Analysis: LLM-powered deobfuscation, WebAssembly (WASM) disassembly, Source Map reconstruction, and binary entropy visualization.
π§° Process & Memory Forensics: Native Frida instrumentation, memory scanning, pointer dereferencing, and strict Anti-Debug mitigation.
π Dynamic Extensibility: Hot-reloadable B-Skeleton plugins and declarative
WorkflowContractpipelines.
Architecture & Performance
Context Efficiency Benchmark: Built-in tool-schema init delta (Claude server-side count): search β 3.0K tokens vs full β 40.0K+ tokens.
Progressive Tool Discovery:
search_toolsmeta-tool (BM25 ranking) +activate_tools/activate_domain+ profile-based tier upgrades (boost_profile)Search-tier behavior:
search_toolsonly searches and ranks results; it does not auto-runactivate_tools, and it does not auto-runboost_profile. Preferred chain:search_tools -> activate_tools / activate_domain -> boost_profile only when neededDo not boost for one tool:
activate_toolscan register exact tools across tiers from the current base tier;boost_profileis better when you expect to reuse a broad family of related tools repeatedlyLazy Domain Initialization: Handler classes instantiated via Proxy on first invocation, not during startup
Domain Self-Discovery: Runtime manifest scanning (
domains/*/manifest.ts) replaces hardcoded imports; add new domains by creating a single manifest fileB-Skeleton Contracts: Extensibility contracts for plugins (
PluginContract), workflows (WorkflowContract), and observability (InstrumentationContract)MCP ToolAnnotations: Every tool carries semantic annotations (
readOnlyHint,destructiveHint,idempotentHint,openWorldHint) enabling AI orchestrators to reason about tool safety and side-effects before invocation
Registry Snapshot
The built-in surface below is generated from the runtime registry and checked in CI.
Package version:
0.3.0Built-in Tools:
387Domains:
adb-bridge,antidebug,binary-instrument,boringssl-inspector,browser,canvas,coordination,core,cross-domain,debugger,encoding,evidence,extension-registry,graphql,hooks,instrumentation,macro,maintenance,memory,mojo-ipc,network,platform,process,protocol-analysis,proxy,sandbox,shared-state-board,skia-capture,sourcemap,streaming,syscall-hook,trace,transform,v8-inspector,wasm,workflowNote: this snapshot is generated from the runtime registry; do not edit the counts by hand.
Project Stats
Star History
Maintenance
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/vmoranv/jshookmcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server