Skip to content

A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.

License

Notifications You must be signed in to change notification settings

FuzzingLabs/mcp-security-hub

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Offensive Security MCP Servers

Build Status Security Scan License: MIT MCP Protocol

Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.

36 MCPs 185+ Tools Docker Ready

Features

  • 36 MCP Servers covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, and more
  • 175+ Security Tools accessible via natural language through Claude or other MCP clients
  • Production Hardened - Non-root containers, minimal images, Trivy-scanned
  • Docker Compose orchestration for multi-tool workflows
  • CI/CD Ready with GitHub Actions for automated builds and security scanning

Quick Start

# Clone the repository
git clone https://github.com/FuzzingLabs/mcp-security-hub
cd mcp-security-hub

# Build all MCP servers
docker-compose build

# Start specific servers
docker-compose up nmap-mcp nuclei-mcp -d

# Verify health
docker-compose ps

Configure Claude Desktop / Claude Code

Important: You must build the images first with docker-compose build before using them.

Copy the example config to your Claude Desktop configuration:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json

Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "nmap": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "--cap-add=NET_RAW", "nmap-mcp:latest"]
    },
    "nuclei": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "nuclei-mcp:latest"]
    },
    "gitleaks": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "-v", "/path/to/repos:/app/target:ro", "gitleaks-mcp:latest"]
    },
    "radare2": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "-v", "/path/to/binaries:/samples:ro", "radare2-mcp:latest"]
    }
  }
}

For project-level config, copy .mcp.json to your project root. See examples/ for full configuration templates with all MCPs and volume mount patterns.

Available MCP Servers

Reconnaissance (8 servers)

Server Tools Description
nmap-mcp 8 Port scanning, service detection, OS fingerprinting, NSE scripts
shodan-mcp - Wrapper for official Shodan MCP
pd-tools-mcp - Wrapper for ProjectDiscovery tools (subfinder, httpx, katana)
whatweb-mcp 5 Web technology fingerprinting and CMS detection
masscan-mcp 6 High-speed port scanning for large networks
zoomeye-mcp - Wrapper for ZoomEye MCP - Cyberspace search engine
networksdb-mcp 4 IP/ASN/DNS lookups via NetworksDB
externalattacker-mcp 6 Attack surface mapping with ExternalAttacker

Web Security (6 servers)

Server Tools Description
nuclei-mcp 7 Template-based vulnerability scanning with 8000+ templates
sqlmap-mcp 8 SQL injection detection and exploitation
nikto-mcp - Wrapper for Nikto MCP web server scanner
ffuf-mcp 9 Web fuzzing for directories, files, parameters, and virtual hosts
waybackurls-mcp 3 Fetch historical URLs from Wayback Machine for reconnaissance
burp-mcp - Wrapper for official Burp Suite MCP

Binary Analysis (6 servers)

Server Tools Description
radare2-mcp 32 Wrapper for official radare2-mcp - disassembly, decompilation
binwalk-mcp 6 Firmware analysis, signature scanning, extraction
yara-mcp 7 Pattern matching for malware classification
capa-mcp 5 Capability detection in executables
ghidra-mcp - Wrapper for pyghidra-mcp - Headless AI-powered reverse engineering
ida-mcp - Wrapper for ida-pro-mcp - IDA Pro integration

Blockchain Security (3 servers)

Server Tools Description
daml-viewer-mcp 1 DAML access-control table generation and run tracking
medusa-mcp 4 High-performance smart contract fuzzer for Solidity
solazy-mcp 8 Solana sBPF static analysis and reverse engineering

Cloud Security (3 servers)

Server Tools Description
trivy-mcp 7 Container, filesystem, and IaC vulnerability scanning
prowler-mcp 6 AWS/Azure/GCP security auditing and compliance
roadrecon-mcp 6 Azure AD enumeration via RoadRecon

Secrets Detection (1 server)

Server Tools Description
gitleaks-mcp 5 Find secrets and credentials in git repos and files

Exploitation (1 server)

Server Tools Description
searchsploit-mcp 5 Exploit-DB search and retrieval

OSINT (2 servers)

Server Tools Description
maigret-mcp - Wrapper for mcp-maigret - Username OSINT across 2500+ sites
dnstwist-mcp - Wrapper for mcp-dnstwist - Typosquatting/phishing detection

Threat Intelligence (2 servers)

Server Tools Description
virustotal-mcp - Wrapper for mcp-virustotal - Malware analysis and threat intel
otx-mcp - Wrapper for OTX MCP - AlienVault Open Threat Exchange

Active Directory (1 server)

Server Tools Description
bloodhound-mcp 75+ Wrapper for BloodHound-MCP-AI - AD attack path analysis

Password Cracking (1 server)

Server Tools Description
hashcat-mcp - Wrapper for hashcat-mcp - Natural language hash cracking

Code Security (1 server)

Server Tools Description
semgrep-mcp 7 Wrapper for Semgrep MCP - Static code analysis with 5000+ rules

Meta (1 server)

Server Tools Description
mcp-scan - Wrapper for mcp-scan - Scan MCP servers for vulnerabilities

Usage Examples

Network Reconnaissance

You: "Scan 192.168.1.0/24 for web servers and identify technologies"

Claude: I'll perform a network scan and technology fingerprinting.
[Uses nmap-mcp to scan ports 80,443,8080]
[Uses whatweb-mcp to fingerprint discovered hosts]

Found 12 web servers:
- 192.168.1.10: Apache 2.4.52, WordPress 6.4
- 192.168.1.15: nginx 1.24, React application
...

Vulnerability Assessment

You: "Check example.com for common vulnerabilities"

Claude: I'll run a vulnerability scan using nuclei templates.
[Uses nuclei-mcp with cves, exposures, and misconfigurations templates]

Found 3 issues:
- HIGH: CVE-2024-1234 - Outdated jQuery version
- MEDIUM: Exposed .git directory
- INFO: Missing security headers

Binary Analysis

You: "Analyze this firmware image for security issues"

Claude: I'll extract and analyze the firmware.
[Uses binwalk-mcp to extract filesystem]
[Uses yara-mcp to scan for malware patterns]
[Uses capa-mcp to identify capabilities]

Analysis complete:
- Extracted 847 files from SquashFS filesystem
- Found hardcoded credentials in /etc/shadow
- Identified network backdoor capability

Security Hardening

All containers implement defense-in-depth:

Control Implementation
Non-root execution Runs as mcpuser (UID 1000)
Minimal images Alpine/Debian slim base images
Dropped capabilities cap_drop: ALL, selective cap_add
No privilege escalation security_opt: no-new-privileges:true
Read-only mounts Sample directories mounted read-only
Resource limits CPU and memory constraints
Health checks Built-in container health monitoring
Vulnerability scanning Trivy scans in CI/CD pipeline

Project Structure

mcp-security-hub/
├── reconnaissance/
│   ├── nmap-mcp/           # Port scanning
│   ├── shodan-mcp/         # Internet device search (wrapper)
│   ├── pd-tools-mcp/       # ProjectDiscovery tools (wrapper)
│   ├── whatweb-mcp/        # Web fingerprinting
│   ├── masscan-mcp/        # High-speed scanning
│   ├── zoomeye-mcp/        # Cyberspace search (wrapper)
│   ├── networksdb-mcp/     # IP/ASN/DNS lookups
│   └── externalattacker-mcp/ # Attack surface mapping
├── web-security/
│   ├── nuclei-mcp/         # Vulnerability scanning
│   ├── sqlmap-mcp/         # SQL injection
│   ├── nikto-mcp/          # Web server scanning (wrapper)
│   ├── ffuf-mcp/           # Web fuzzing
│   └── burp-mcp/           # Burp Suite (wrapper)
├── binary-analysis/
│   ├── radare2-mcp/        # Reverse engineering (wrapper)
│   ├── binwalk-mcp/        # Firmware analysis
│   ├── yara-mcp/           # Malware detection
│   ├── capa-mcp/           # Capability detection
│   ├── ghidra-mcp/         # Ghidra RE - pyghidra-mcp (headless)
│   └── ida-mcp/            # IDA Pro (wrapper)
├── blockchain/
│   ├── daml-viewer-mcp/    # DAML access-control analysis
│   ├── medusa-mcp/         # Smart contract fuzzing
│   └── solazy-mcp/         # Solana analysis
├── cloud-security/
│   ├── trivy-mcp/          # Container scanning (wrapper)
│   ├── prowler-mcp/        # Cloud auditing
│   └── roadrecon-mcp/      # Azure AD enumeration
├── code-security/
│   └── semgrep-mcp/        # Static code analysis (wrapper)
├── secrets/
│   └── gitleaks-mcp/       # Secrets detection
├── exploitation/
│   └── searchsploit-mcp/   # Exploit database
├── osint/
│   ├── maigret-mcp/        # Username OSINT (wrapper)
│   └── dnstwist-mcp/       # Typosquatting detection (wrapper)
├── threat-intel/
│   ├── virustotal-mcp/     # Malware analysis (wrapper)
│   └── otx-mcp/            # AlienVault OTX (wrapper)
├── active-directory/
│   └── bloodhound-mcp/     # AD attack paths (wrapper)
├── password-cracking/
│   └── hashcat-mcp/        # Hash cracking (wrapper)
├── meta/
│   └── mcp-scan/           # MCP security scanning
├── scripts/
│   ├── setup.sh            # Quick setup
│   └── healthcheck.sh      # Health verification
├── tests/
│   └── test_mcp_servers.py # Unit tests
├── docker-compose.yml      # Orchestration
└── .github/workflows/      # CI/CD

Testing

# Run unit tests
pytest tests/ -v

# Build and test all Docker images
./scripts/test_builds.sh

# Test MCP protocol (after building)
echo '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' | \
  docker run -i --rm nmap-mcp:latest

Legal & Compliance

These tools are for authorized security testing only.

Before using:

  1. Obtain written authorization from the target owner
  2. Define scope - targets, timeline, allowed activities
  3. Maintain audit logs of all operations
  4. Follow responsible disclosure for any findings

Unauthorized access to computer systems is illegal. Users are responsible for compliance with applicable laws.

Contributing

Contributions welcome! To add a new MCP server:

  1. Use Dockerfile.template as your starting point
  2. Follow security hardening practices (non-root, minimal image)
  3. Include health checks and comprehensive README
  4. Ensure Trivy scan passes (no HIGH/CRITICAL vulnerabilities)
  5. Add tests to tests/test_mcp_servers.py

Acknowledgments

License

MIT License - See LICENSE


Maintained by FuzzingLabs
Making AI-powered security testing accessible

About

A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 6