JsHookMcp
The js hook toolkit that all you need
@jshookmcp/jshook
English | δΈζ
An MCP (Model Context Protocol) server with a runtime-registry-driven catalog of built-in tools for AI-assisted JavaScript analysis and security analysis. It combines browser automation, Chrome DevTools Protocol debugging, network monitoring, intelligent JavaScript hooks, LLM-powered code analysis, process and memory inspection, WASM tooling, source-map reconstruction, AST transforms, and composite workflows in a single server.
Documentation / Quick Links
π Quick Start
Use jshookmcp instantly with Claude Desktop or Cursor without installing anything globally.
Claude Desktop Configuration (claude_desktop_config.json):
{
"mcpServers": {
"jshook": {
"command": "npx",
"args": ["-y", "@jshookmcp/jshook@latest"],
"env": {
"JSHOOK_BASE_PROFILE": "search"
}
}
}
}
(Note for Windows users: If npx is not found, specify the absolute path to npx.cmd)
π Key Highlights
- π€ AI-Driven Analysis: Leverage LLMs for intelligent JavaScript deobfuscation, cryptographic algorithm detection, and AST-level code comprehension.
- β‘ Search-First Context Efficiency: BM25-powered
search_tools+ dynamic boosts cut jshook's tool-schema init delta from ~40.0K+ tokens (full) to ~3.0K (search) (Claude server-side count; excludes Claude Code base prompt). - π― Progressive Capability Tiers: Three built-in profiles (
search/workflow/full), withsearchas the default base tier for on-demand capability scaling. - π Full-Stack Automation: Seamlessly orchestrate Chromium/Camoufox browsers, CDP debugging, and network interception as atomic actions.
- π‘οΈ Advanced Anti-Debug: Built-in evasion for debugger statements, timing checks, and strict headless bot fingerprinting techniques.
- π§© Dynamic Extensibility: Hot-reload plugins and workflows from local directories without recompiling the core server.
- π§ Zero-Wiring Extensibility: Auto-discovered domains via
manifest.ts, lazy handler instantiation, and B-Skeleton contracts for plugins/workflows. - π οΈ Reverse Engineering Toolchain: Integrated WASM disassembly, binary entropy analysis, in-memory scanning, and bridges for Burp Suite/Ghidra/IDA Pro.
π‘οΈ Core Capabilities
JSHookMCP exposes 360+ atomic tools across 36 domains, empowering AI orchestrators with unparalleled capabilities:
- πΈοΈ Browser Automation & Reverse Engineering: Zero-config Chromium/Camoufox injection, CDP (Chrome DevTools Protocol) orchestration, and iframe evaluation bypasses.
- π‘ Network Interception & Spoofing: Deep HTTP/2 frame building, MiTM traffic capture, GraphQL introspection, and Burp Suite bridge.
- π§ AST & Semantic Analysis: LLM-powered deobfuscation, WebAssembly (WASM) disassembly, Source Map reconstruction, and binary entropy visualization.
- π§° Process & Memory Forensics: Native Frida instrumentation, memory scanning, pointer dereferencing, and strict Anti-Debug mitigation.
- π Dynamic Extensibility: Hot-reloadable B-Skeleton plugins and declarative
WorkflowContractpipelines.
Architecture & Performance
[!TIP] Context Efficiency Benchmark: Built-in tool-schema init delta (Claude server-side count):
searchβ 3.0K tokens vsfullβ 40.0K+ tokens.
- Progressive Tool Discovery:
search_toolsmeta-tool (BM25 ranking) +activate_tools/activate_domain+ profile-based tier upgrades (boost_profile) - Search-tier behavior:
search_toolsonly searches and ranks results; it does not auto-runactivate_tools, and it does not auto-runboost_profile. Preferred chain:search_tools -> activate_tools / activate_domain -> boost_profile only when needed - Do not boost for one tool:
activate_toolscan register exact tools across tiers from the current base tier;boost_profileis better when you expect to reuse a broad family of related tools repeatedly - Lazy Domain Initialization: Handler classes instantiated via Proxy on first invocation, not during startup
- Domain Self-Discovery: Runtime manifest scanning (
domains/*/manifest.ts) replaces hardcoded imports; add new domains by creating a single manifest file - B-Skeleton Contracts: Extensibility contracts for plugins (
PluginContract), workflows (WorkflowContract), and observability (InstrumentationContract) - MCP ToolAnnotations: Every tool carries semantic annotations (
readOnlyHint,destructiveHint,idempotentHint,openWorldHint) enabling AI orchestrators to reason about tool safety and side-effects before invocation
Registry Snapshot
The built-in surface below is generated from the runtime registry and checked in CI.
- Package version:
0.3.0 - Built-in Tools:
387 - Domains:
adb-bridge,antidebug,binary-instrument,boringssl-inspector,browser,canvas,coordination,core,cross-domain,debugger,encoding,evidence,extension-registry,graphql,hooks,instrumentation,macro,maintenance,memory,mojo-ipc,network,platform,process,protocol-analysis,proxy,sandbox,shared-state-board,skia-capture,sourcemap,streaming,syscall-hook,trace,transform,v8-inspector,wasm,workflow - Note: this snapshot is generated from the runtime registry; do not edit the counts by hand.
Project Stats
Related Servers
Bright Data
sponsorDiscover, extract, and interact with the web - one interface powering automated access across the public internet.
Jina Reader
Fetch the content of a remote URL as Markdown with Jina Reader.
Web Fetch
Fetches and converts web content, ideal for data extraction and web scraping.
Videogame Encyclopedia MCP Server
MPC server dedicated to gather information for videogames
Browser Use
Enables AI agents to control web browsers using natural language commands.
Pip Server
Market Data
Playwright
Playwright MCP server
MCP Video Download URL Parser
Download watermark-free videos from platforms like Douyin and TikTok.
ScraperCity
B2B lead generation MCP server - Apollo, Google Maps, email finder, skip trace, and 15+ more tools.
YouTube Transcript
An MCP server for extracting and processing transcripts from YouTube videos.
Web Scraper Service
A Python-based MCP server for headless web scraping. It extracts the main text content from web pages and outputs it as Markdown, text, or HTML.