MCP Hub
Back to servers

mcp-security-hub

A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.

Stars
151
Forks
26
Updated
Jan 28, 2026
Validated
Jan 30, 2026

Offensive Security MCP Servers

Build Status Security Scan License: MIT MCP Protocol

Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.

28 MCPs 163+ Tools Docker Ready

Features

  • 28 MCP Servers covering reconnaissance, web security, binary analysis, cloud security, secrets detection, threat intelligence, OSINT, Active Directory, and more
  • 163+ Security Tools accessible via natural language through Claude or other MCP clients
  • Production Hardened - Non-root containers, minimal images, Trivy-scanned
  • Docker Compose orchestration for multi-tool workflows
  • CI/CD Ready with GitHub Actions for automated builds and security scanning

Quick Start

# Clone the repository
git clone https://github.com/FuzzingLabs/mcp-security-hub
cd mcp-security-hub

# Build all MCP servers
docker-compose build

# Start specific servers
docker-compose up nmap-mcp nuclei-mcp -d

# Verify health
docker-compose ps

Configure Claude Desktop

Important: You must build the images first with docker-compose build before using them.

Add to your Claude Desktop configuration:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json

Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "nmap": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "--cap-add=NET_RAW", "nmap-mcp:latest"]
    },
    "nuclei": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "nuclei-mcp:latest"]
    },
    "radare2": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "-v", "/path/to/binaries:/samples:ro", "radare2-mcp:latest"]
    }
  }
}

Available MCP Servers

Reconnaissance (6 servers)

ServerToolsDescription
nmap-mcp8Port scanning, service detection, OS fingerprinting, NSE scripts
shodan-mcp-Wrapper for official Shodan MCP
pd-tools-mcp-Wrapper for ProjectDiscovery tools (subfinder, httpx, katana)
whatweb-mcp5Web technology fingerprinting and CMS detection
masscan-mcp6High-speed port scanning for large networks
zoomeye-mcp-Wrapper for ZoomEye MCP - Cyberspace search engine

Web Security (6 servers)

ServerToolsDescription
nuclei-mcp7Template-based vulnerability scanning with 8000+ templates
sqlmap-mcp8SQL injection detection and exploitation
nikto-mcp-Wrapper for Nikto MCP web server scanner
ffuf-mcp9Web fuzzing for directories, files, parameters, and virtual hosts
waybackurls-mcp3Fetch historical URLs from Wayback Machine for reconnaissance
burp-mcp-Wrapper for official Burp Suite MCP

Binary Analysis (6 servers)

ServerToolsDescription
radare2-mcp32Wrapper for official radare2-mcp - disassembly, decompilation
binwalk-mcp6Firmware analysis, signature scanning, extraction
yara-mcp7Pattern matching for malware classification
capa-mcp5Capability detection in executables
ghidra-mcp-Wrapper for pyghidra-mcp - Headless AI-powered reverse engineering
ida-mcp-Wrapper for ida-pro-mcp - IDA Pro integration

Cloud Security (2 servers)

ServerToolsDescription
trivy-mcp7Container, filesystem, and IaC vulnerability scanning
prowler-mcp6AWS/Azure/GCP security auditing and compliance

Secrets Detection (1 server)

ServerToolsDescription
gitleaks-mcp5Find secrets and credentials in git repos and files

Exploitation (1 server)

ServerToolsDescription
searchsploit-mcp5Exploit-DB search and retrieval

OSINT (2 servers)

ServerToolsDescription
maigret-mcp-Wrapper for mcp-maigret - Username OSINT across 2500+ sites
dnstwist-mcp-Wrapper for mcp-dnstwist - Typosquatting/phishing detection

Threat Intelligence (2 servers)

ServerToolsDescription
virustotal-mcp-Wrapper for mcp-virustotal - Malware analysis and threat intel
otx-mcp-Wrapper for OTX MCP - AlienVault Open Threat Exchange

Active Directory (1 server)

ServerToolsDescription
bloodhound-mcp75+Wrapper for BloodHound-MCP-AI - AD attack path analysis

Password Cracking (1 server)

ServerToolsDescription
hashcat-mcp-Wrapper for hashcat-mcp - Natural language hash cracking

Usage Examples

Network Reconnaissance

You: "Scan 192.168.1.0/24 for web servers and identify technologies"

Claude: I'll perform a network scan and technology fingerprinting.
[Uses nmap-mcp to scan ports 80,443,8080]
[Uses whatweb-mcp to fingerprint discovered hosts]

Found 12 web servers:
- 192.168.1.10: Apache 2.4.52, WordPress 6.4
- 192.168.1.15: nginx 1.24, React application
...

Vulnerability Assessment

You: "Check example.com for common vulnerabilities"

Claude: I'll run a vulnerability scan using nuclei templates.
[Uses nuclei-mcp with cves, exposures, and misconfigurations templates]

Found 3 issues:
- HIGH: CVE-2024-1234 - Outdated jQuery version
- MEDIUM: Exposed .git directory
- INFO: Missing security headers

Binary Analysis

You: "Analyze this firmware image for security issues"

Claude: I'll extract and analyze the firmware.
[Uses binwalk-mcp to extract filesystem]
[Uses yara-mcp to scan for malware patterns]
[Uses capa-mcp to identify capabilities]

Analysis complete:
- Extracted 847 files from SquashFS filesystem
- Found hardcoded credentials in /etc/shadow
- Identified network backdoor capability

Security Hardening

All containers implement defense-in-depth:

ControlImplementation
Non-root executionRuns as mcpuser (UID 1000)
Minimal imagesAlpine/Debian slim base images
Dropped capabilitiescap_drop: ALL, selective cap_add
No privilege escalationsecurity_opt: no-new-privileges:true
Read-only mountsSample directories mounted read-only
Resource limitsCPU and memory constraints
Health checksBuilt-in container health monitoring
Vulnerability scanningTrivy scans in CI/CD pipeline

Project Structure

mcp-security-hub/
├── reconnaissance/
│   ├── nmap-mcp/           # Port scanning
│   ├── shodan-mcp/         # Internet device search (wrapper)
│   ├── pd-tools-mcp/       # ProjectDiscovery tools (wrapper)
│   ├── whatweb-mcp/        # Web fingerprinting
│   ├── masscan-mcp/        # High-speed scanning
│   └── zoomeye-mcp/        # Cyberspace search (wrapper)
├── web-security/
│   ├── nuclei-mcp/         # Vulnerability scanning
│   ├── sqlmap-mcp/         # SQL injection
│   ├── nikto-mcp/          # Web server scanning (wrapper)
│   ├── ffuf-mcp/           # Web fuzzing
│   └── burp-mcp/           # Burp Suite (wrapper)
├── binary-analysis/
│   ├── radare2-mcp/        # Reverse engineering (wrapper)
│   ├── binwalk-mcp/        # Firmware analysis
│   ├── yara-mcp/           # Malware detection
│   ├── capa-mcp/           # Capability detection
│   ├── ghidra-mcp/         # Ghidra RE - pyghidra-mcp (headless)
│   └── ida-mcp/            # IDA Pro (wrapper)
├── cloud-security/
│   ├── trivy-mcp/          # Container scanning (wrapper)
│   └── prowler-mcp/        # Cloud auditing
├── secrets/
│   └── gitleaks-mcp/       # Secrets detection
├── exploitation/
│   └── searchsploit-mcp/   # Exploit database
├── osint/
│   ├── maigret-mcp/        # Username OSINT (wrapper)
│   └── dnstwist-mcp/       # Typosquatting detection (wrapper)
├── threat-intel/
│   ├── virustotal-mcp/     # Malware analysis (wrapper)
│   └── otx-mcp/            # AlienVault OTX (wrapper)
├── active-directory/
│   └── bloodhound-mcp/     # AD attack paths (wrapper)
├── password-cracking/
│   └── hashcat-mcp/        # Hash cracking (wrapper)
├── scripts/
│   ├── setup.sh            # Quick setup
│   └── healthcheck.sh      # Health verification
├── tests/
│   └── test_mcp_servers.py # Unit tests
├── docker-compose.yml      # Orchestration
└── .github/workflows/      # CI/CD

Testing

# Run unit tests
pytest tests/ -v

# Build and test all Docker images
./scripts/test_builds.sh

# Test MCP protocol (after building)
echo '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' | \
  docker run -i --rm nmap-mcp:latest

Legal & Compliance

These tools are for authorized security testing only.

Before using:

  1. Obtain written authorization from the target owner
  2. Define scope - targets, timeline, allowed activities
  3. Maintain audit logs of all operations
  4. Follow responsible disclosure for any findings

Unauthorized access to computer systems is illegal. Users are responsible for compliance with applicable laws.

Contributing

Contributions welcome! To add a new MCP server:

  1. Use Dockerfile.template as your starting point
  2. Follow security hardening practices (non-root, minimal image)
  3. Include health checks and comprehensive README
  4. Ensure Trivy scan passes (no HIGH/CRITICAL vulnerabilities)
  5. Add tests to tests/test_mcp_servers.py

Acknowledgments

License

MIT License - See LICENSE


Maintained by Fuzzing Labs
Making AI-powered security testing accessible

Reviews

No reviews yet

Sign in to write a review

mcp-security-hub — MCP Server | MCP Hub