zap-mcp-sqlmap-setup

zap-mcp-sqlmap-setup

3.2

If you are the rightful owner of zap-mcp-sqlmap-setup and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

ZAP MCP Server with SQLMap Integration is a setup guide for using OWASP ZAP as a Man-in-the-middle Proxy server with SQLMap for security testing.

ZAP MCP Server with SQLMap Integration Setup Guide

This repository contains setup instructions and configuration files for using OWASP ZAP as an MCP (Man-in-the-middle Proxy) server with SQLMap integration for legitimate security testing and vulnerability assessment.

Prerequisites

  • Docker installed on your system
  • Basic understanding of web security testing
  • Administrator/root access to your system

Quick Setup

1. Clone this repository:

git clone https://github.com/UnknownAirtist/zap-mcp-sqlmap-setup.git
cd zap-mcp-sqlmap-setup

2. Run the setup script:

chmod +x setup.sh
./setup.sh

3. Start the ZAP MCP server:

docker-compose up -d

This will start the ZAP server on port 8080 and the API on port 8090.

Manual Setup

1. Install OWASP ZAP

You can install ZAP using Docker (recommended):

docker pull owasp/zap2docker-stable

Or download it directly from the official website.

2. Install SQLMap

SQLMap can be installed from the repository:

git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git

3. Configure ZAP as an MCP server:

Start ZAP in daemon mode:

docker run -u zap -p 8080:8080 -p 8090:8090 -i owasp/zap2docker-stable zap.sh -daemon -host 0.0.0.0 -port 8080 -config api.disablekey=true

4. Set up SQLMap with ZAP:

Use SQLMap with ZAP as a proxy:

python sqlmap.py -u "http://target-website.com" --proxy=http://localhost:8080

Advanced Configuration

Custom ZAP Rules

The zap-rules directory contains custom ZAP rules for improving detection of SQL injection vulnerabilities:

  • Copy the .js files to the ZAP scripts directory
  • Enable them in the ZAP UI under Tools > Scripts

SQLMap Integration Scripts

The sqlmap-scripts directory contains helper scripts for tighter integration:

  • zap-sqlmap-bridge.py: Forwards ZAP findings to SQLMap for deeper testing
  • auto-scan.py: Automated scanning of all forms found on a target site

Usage Examples

Basic Scan

./scripts/start-scan.sh http://example.com

Full Scan with SQLMap Integration

./scripts/full-scan.sh http://vulnerable-website.com

Continuous Integration Setup

See the ci-example directory for GitHub Actions and Jenkins configuration examples.

Security Considerations

āš ļø IMPORTANT: Only use these tools on systems you own or have explicit permission to test. Unauthorized security testing is illegal in most jurisdictions.

Troubleshooting

  • Check logs/zap.log for ZAP-related issues
  • Check logs/sqlmap.log for SQLMap-related issues
  • If the server is not responding, ensure ports 8080 and 8090 are not in use by other applications

License

This project is licensed under the MIT License - see the LICENSE file for details.