Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.
- 36 MCP Servers covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, and more
- 175+ Security Tools accessible via natural language through Claude or other MCP clients
- Production Hardened - Non-root containers, minimal images, Trivy-scanned
- Docker Compose orchestration for multi-tool workflows
- CI/CD Ready with GitHub Actions for automated builds and security scanning
# Clone the repository
git clone https://github.com/FuzzingLabs/mcp-security-hub
cd mcp-security-hub
# Build all MCP servers
docker-compose build
# Start specific servers
docker-compose up nmap-mcp nuclei-mcp -d
# Verify health
docker-compose psImportant: You must build the images first with docker-compose build before using them.
Copy the example config to your Claude Desktop configuration:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"nmap": {
"command": "docker",
"args": ["run", "-i", "--rm", "--cap-add=NET_RAW", "nmap-mcp:latest"]
},
"nuclei": {
"command": "docker",
"args": ["run", "-i", "--rm", "nuclei-mcp:latest"]
},
"gitleaks": {
"command": "docker",
"args": ["run", "-i", "--rm", "-v", "/path/to/repos:/app/target:ro", "gitleaks-mcp:latest"]
},
"radare2": {
"command": "docker",
"args": ["run", "-i", "--rm", "-v", "/path/to/binaries:/samples:ro", "radare2-mcp:latest"]
}
}
}For project-level config, copy .mcp.json to your project root. See examples/ for full configuration templates with all MCPs and volume mount patterns.
| Server | Tools | Description |
|---|---|---|
| nmap-mcp | 8 | Port scanning, service detection, OS fingerprinting, NSE scripts |
| shodan-mcp | - | Wrapper for official Shodan MCP |
| pd-tools-mcp | - | Wrapper for ProjectDiscovery tools (subfinder, httpx, katana) |
| whatweb-mcp | 5 | Web technology fingerprinting and CMS detection |
| masscan-mcp | 6 | High-speed port scanning for large networks |
| zoomeye-mcp | - | Wrapper for ZoomEye MCP - Cyberspace search engine |
| networksdb-mcp | 4 | IP/ASN/DNS lookups via NetworksDB |
| externalattacker-mcp | 6 | Attack surface mapping with ExternalAttacker |
| Server | Tools | Description |
|---|---|---|
| nuclei-mcp | 7 | Template-based vulnerability scanning with 8000+ templates |
| sqlmap-mcp | 8 | SQL injection detection and exploitation |
| nikto-mcp | - | Wrapper for Nikto MCP web server scanner |
| ffuf-mcp | 9 | Web fuzzing for directories, files, parameters, and virtual hosts |
| waybackurls-mcp | 3 | Fetch historical URLs from Wayback Machine for reconnaissance |
| burp-mcp | - | Wrapper for official Burp Suite MCP |
| Server | Tools | Description |
|---|---|---|
| radare2-mcp | 32 | Wrapper for official radare2-mcp - disassembly, decompilation |
| binwalk-mcp | 6 | Firmware analysis, signature scanning, extraction |
| yara-mcp | 7 | Pattern matching for malware classification |
| capa-mcp | 5 | Capability detection in executables |
| ghidra-mcp | - | Wrapper for pyghidra-mcp - Headless AI-powered reverse engineering |
| ida-mcp | - | Wrapper for ida-pro-mcp - IDA Pro integration |
| Server | Tools | Description |
|---|---|---|
| daml-viewer-mcp | 1 | DAML access-control table generation and run tracking |
| medusa-mcp | 4 | High-performance smart contract fuzzer for Solidity |
| solazy-mcp | 8 | Solana sBPF static analysis and reverse engineering |
| Server | Tools | Description |
|---|---|---|
| trivy-mcp | 7 | Container, filesystem, and IaC vulnerability scanning |
| prowler-mcp | 6 | AWS/Azure/GCP security auditing and compliance |
| roadrecon-mcp | 6 | Azure AD enumeration via RoadRecon |
| Server | Tools | Description |
|---|---|---|
| gitleaks-mcp | 5 | Find secrets and credentials in git repos and files |
| Server | Tools | Description |
|---|---|---|
| searchsploit-mcp | 5 | Exploit-DB search and retrieval |
| Server | Tools | Description |
|---|---|---|
| maigret-mcp | - | Wrapper for mcp-maigret - Username OSINT across 2500+ sites |
| dnstwist-mcp | - | Wrapper for mcp-dnstwist - Typosquatting/phishing detection |
| Server | Tools | Description |
|---|---|---|
| virustotal-mcp | - | Wrapper for mcp-virustotal - Malware analysis and threat intel |
| otx-mcp | - | Wrapper for OTX MCP - AlienVault Open Threat Exchange |
| Server | Tools | Description |
|---|---|---|
| bloodhound-mcp | 75+ | Wrapper for BloodHound-MCP-AI - AD attack path analysis |
| Server | Tools | Description |
|---|---|---|
| hashcat-mcp | - | Wrapper for hashcat-mcp - Natural language hash cracking |
| Server | Tools | Description |
|---|---|---|
| semgrep-mcp | 7 | Wrapper for Semgrep MCP - Static code analysis with 5000+ rules |
| Server | Tools | Description |
|---|---|---|
| mcp-scan | - | Wrapper for mcp-scan - Scan MCP servers for vulnerabilities |
You: "Scan 192.168.1.0/24 for web servers and identify technologies"
Claude: I'll perform a network scan and technology fingerprinting.
[Uses nmap-mcp to scan ports 80,443,8080]
[Uses whatweb-mcp to fingerprint discovered hosts]
Found 12 web servers:
- 192.168.1.10: Apache 2.4.52, WordPress 6.4
- 192.168.1.15: nginx 1.24, React application
...
You: "Check example.com for common vulnerabilities"
Claude: I'll run a vulnerability scan using nuclei templates.
[Uses nuclei-mcp with cves, exposures, and misconfigurations templates]
Found 3 issues:
- HIGH: CVE-2024-1234 - Outdated jQuery version
- MEDIUM: Exposed .git directory
- INFO: Missing security headers
You: "Analyze this firmware image for security issues"
Claude: I'll extract and analyze the firmware.
[Uses binwalk-mcp to extract filesystem]
[Uses yara-mcp to scan for malware patterns]
[Uses capa-mcp to identify capabilities]
Analysis complete:
- Extracted 847 files from SquashFS filesystem
- Found hardcoded credentials in /etc/shadow
- Identified network backdoor capability
All containers implement defense-in-depth:
| Control | Implementation |
|---|---|
| Non-root execution | Runs as mcpuser (UID 1000) |
| Minimal images | Alpine/Debian slim base images |
| Dropped capabilities | cap_drop: ALL, selective cap_add |
| No privilege escalation | security_opt: no-new-privileges:true |
| Read-only mounts | Sample directories mounted read-only |
| Resource limits | CPU and memory constraints |
| Health checks | Built-in container health monitoring |
| Vulnerability scanning | Trivy scans in CI/CD pipeline |
mcp-security-hub/
├── reconnaissance/
│ ├── nmap-mcp/ # Port scanning
│ ├── shodan-mcp/ # Internet device search (wrapper)
│ ├── pd-tools-mcp/ # ProjectDiscovery tools (wrapper)
│ ├── whatweb-mcp/ # Web fingerprinting
│ ├── masscan-mcp/ # High-speed scanning
│ ├── zoomeye-mcp/ # Cyberspace search (wrapper)
│ ├── networksdb-mcp/ # IP/ASN/DNS lookups
│ └── externalattacker-mcp/ # Attack surface mapping
├── web-security/
│ ├── nuclei-mcp/ # Vulnerability scanning
│ ├── sqlmap-mcp/ # SQL injection
│ ├── nikto-mcp/ # Web server scanning (wrapper)
│ ├── ffuf-mcp/ # Web fuzzing
│ └── burp-mcp/ # Burp Suite (wrapper)
├── binary-analysis/
│ ├── radare2-mcp/ # Reverse engineering (wrapper)
│ ├── binwalk-mcp/ # Firmware analysis
│ ├── yara-mcp/ # Malware detection
│ ├── capa-mcp/ # Capability detection
│ ├── ghidra-mcp/ # Ghidra RE - pyghidra-mcp (headless)
│ └── ida-mcp/ # IDA Pro (wrapper)
├── blockchain/
│ ├── daml-viewer-mcp/ # DAML access-control analysis
│ ├── medusa-mcp/ # Smart contract fuzzing
│ └── solazy-mcp/ # Solana analysis
├── cloud-security/
│ ├── trivy-mcp/ # Container scanning (wrapper)
│ ├── prowler-mcp/ # Cloud auditing
│ └── roadrecon-mcp/ # Azure AD enumeration
├── code-security/
│ └── semgrep-mcp/ # Static code analysis (wrapper)
├── secrets/
│ └── gitleaks-mcp/ # Secrets detection
├── exploitation/
│ └── searchsploit-mcp/ # Exploit database
├── osint/
│ ├── maigret-mcp/ # Username OSINT (wrapper)
│ └── dnstwist-mcp/ # Typosquatting detection (wrapper)
├── threat-intel/
│ ├── virustotal-mcp/ # Malware analysis (wrapper)
│ └── otx-mcp/ # AlienVault OTX (wrapper)
├── active-directory/
│ └── bloodhound-mcp/ # AD attack paths (wrapper)
├── password-cracking/
│ └── hashcat-mcp/ # Hash cracking (wrapper)
├── meta/
│ └── mcp-scan/ # MCP security scanning
├── scripts/
│ ├── setup.sh # Quick setup
│ └── healthcheck.sh # Health verification
├── tests/
│ └── test_mcp_servers.py # Unit tests
├── docker-compose.yml # Orchestration
└── .github/workflows/ # CI/CD
# Run unit tests
pytest tests/ -v
# Build and test all Docker images
./scripts/test_builds.sh
# Test MCP protocol (after building)
echo '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' | \
docker run -i --rm nmap-mcp:latestThese tools are for authorized security testing only.
Before using:
- Obtain written authorization from the target owner
- Define scope - targets, timeline, allowed activities
- Maintain audit logs of all operations
- Follow responsible disclosure for any findings
Unauthorized access to computer systems is illegal. Users are responsible for compliance with applicable laws.
Contributions welcome! To add a new MCP server:
- Use
Dockerfile.templateas your starting point - Follow security hardening practices (non-root, minimal image)
- Include health checks and comprehensive README
- Ensure Trivy scan passes (no HIGH/CRITICAL vulnerabilities)
- Add tests to
tests/test_mcp_servers.py
- Model Context Protocol - Protocol specification
- awesome-mcp-security - MCP security catalog
- Upstream tool maintainers: nmap, nuclei, radare2, sqlmap, and all others
MIT License - See LICENSE
Maintained by FuzzingLabs
Making AI-powered security testing accessible