Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
84 changes: 70 additions & 14 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,38 +30,94 @@ jobs:
fail-fast: false
matrix:
include:
# Reconnaissance
- name: nmap-mcp
context: ./reconnaissance/nmap-mcp
- name: shodan-mcp
context: ./reconnaissance/shodan-mcp
- name: pd-tools-mcp
context: ./reconnaissance/pd-tools-mcp
- name: whatweb-mcp
context: ./reconnaissance/whatweb-mcp
- name: masscan-mcp
context: ./reconnaissance/masscan-mcp
- name: zoomeye-mcp
context: ./reconnaissance/zoomeye-mcp
- name: networksdb-mcp
context: ./reconnaissance/networksdb-mcp
- name: externalattacker-mcp
context: ./reconnaissance/externalattacker-mcp
# Web Security
- name: nuclei-mcp
context: ./web-security/nuclei-mcp
- name: sqlmap-mcp
context: ./web-security/sqlmap-mcp
- name: nikto-mcp
context: ./web-security/nikto-mcp
- name: ffuf-mcp
context: ./web-security/ffuf-mcp
- name: waybackurls-mcp
context: ./web-security/waybackurls-mcp
- name: burp-mcp
context: ./web-security/burp-mcp
# Binary Analysis
- name: binwalk-mcp
context: ./binary-analysis/binwalk-mcp
- name: yara-mcp
context: ./binary-analysis/yara-mcp
- name: capa-mcp
context: ./binary-analysis/capa-mcp
- name: ffuf-mcp
context: ./web-security/ffuf-mcp
- name: whatweb-mcp
context: ./reconnaissance/whatweb-mcp
- name: masscan-mcp
context: ./reconnaissance/masscan-mcp
- name: radare2-mcp
context: ./binary-analysis/radare2-mcp
- name: ghidra-mcp
context: ./binary-analysis/ghidra-mcp
- name: ida-mcp
context: ./binary-analysis/ida-mcp
# Blockchain Security
- name: daml-viewer-mcp
context: ./blockchain/daml-viewer-mcp
- name: medusa-mcp
context: ./blockchain/medusa-mcp
- name: solazy-mcp
context: ./blockchain/solazy-mcp
# Cloud Security
- name: trivy-mcp
context: ./cloud-security/trivy-mcp
- name: prowler-mcp
context: ./cloud-security/prowler-mcp
- name: searchsploit-mcp
context: ./exploitation/searchsploit-mcp
- name: roadrecon-mcp
context: ./cloud-security/roadrecon-mcp
# Secrets Detection
- name: gitleaks-mcp
context: ./secrets/gitleaks-mcp
# Exploitation
- name: searchsploit-mcp
context: ./exploitation/searchsploit-mcp
# Fuzzing
- name: boofuzz-mcp
context: ./fuzzing/boofuzz-mcp
- name: dharma-mcp
context: ./fuzzing/dharma-mcp
# OSINT
- name: maigret-mcp
context: ./osint/maigret-mcp
- name: dnstwist-mcp
context: ./osint/dnstwist-mcp
# Threat Intelligence
- name: virustotal-mcp
context: ./threat-intel/virustotal-mcp
- name: otx-mcp
context: ./threat-intel/otx-mcp
# Active Directory
- name: bloodhound-mcp
context: ./active-directory/bloodhound-mcp
# Password Cracking
- name: hashcat-mcp
context: ./password-cracking/hashcat-mcp
# Code Security
- name: semgrep-mcp
context: ./code-security/semgrep-mcp
- name: networksdb-mcp
context: ./reconnaissance/networksdb-mcp
- name: externalattacker-mcp
context: ./reconnaissance/externalattacker-mcp
- name: roadrecon-mcp
context: ./cloud-security/roadrecon-mcp
# Meta
- name: mcp-scan
context: ./meta/mcp-scan

Expand Down
19 changes: 10 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,15 +8,15 @@
Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.

<p align="center">
<img src="https://img.shields.io/badge/MCPs-36-brightgreen" alt="36 MCPs"/>
<img src="https://img.shields.io/badge/Tools-185+-orange" alt="185+ Tools"/>
<img src="https://img.shields.io/badge/MCPs-38-brightgreen" alt="38 MCPs"/>
<img src="https://img.shields.io/badge/Tools-300+-orange" alt="300+ Tools"/>
<img src="https://img.shields.io/badge/Docker-Ready-blue" alt="Docker Ready"/>
</p>

## Features

- **36 MCP Servers** covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, and more
- **175+ Security Tools** accessible via natural language through Claude or other MCP clients
- **38 MCP Servers** covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, fuzzing, and more
- **300+ Security Tools** accessible via natural language through Claude or other MCP clients
- **Production Hardened** - Non-root containers, minimal images, Trivy-scanned
- **Docker Compose** orchestration for multi-tool workflows
- **CI/CD Ready** with GitHub Actions for automated builds and security scanning
Expand Down Expand Up @@ -138,11 +138,12 @@ For project-level config, copy `.mcp.json` to your project root. See [examples/]
|--------|-------|-------------|
| [searchsploit-mcp](./exploitation/searchsploit-mcp) | 5 | Exploit-DB search and retrieval |

### Fuzzing (2 server)
Server | Tools | Description |
|--------|-------|-------------|
| [boofuzz-mcp](./fuzzing/boofuzz-mcp) | 4 | Network protocol fuzzing using Boofuzz |
| [dharma-mcp](./fuzzing/dharma-mcp) | 2 | Grammar-based test case generation |
### Fuzzing (2 servers)

| Server | Tools | Description |
|--------|-------|-------------|
| [boofuzz-mcp](./fuzzing/boofuzz-mcp) | 4 | Network protocol fuzzing using Boofuzz |
| [dharma-mcp](./fuzzing/dharma-mcp) | 2 | Grammar-based test case generation |

### OSINT (2 servers)

Expand Down
169 changes: 168 additions & 1 deletion docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -785,7 +785,7 @@ services:
image: semgrep-mcp:latest
container_name: semgrep-mcp
ports:
- "3024:3000"
- "3030:3000"
networks:
- mcp-network
restart: unless-stopped
Expand Down Expand Up @@ -896,6 +896,173 @@ services:
cpus: '0.5'
memory: 256M

# ===========================================================================
# Web Security (additional)
# ===========================================================================
burp-mcp:
build:
context: ./web-security/burp-mcp
dockerfile: Dockerfile
image: burp-mcp:latest
container_name: burp-mcp
ports:
- "3031:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '1'
memory: 512M

# ===========================================================================
# Binary Analysis (additional)
# ===========================================================================
ida-mcp:
build:
context: ./binary-analysis/ida-mcp
dockerfile: Dockerfile
image: ida-mcp:latest
container_name: ida-mcp
ports:
- "3032:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '1'
memory: 1G

# ===========================================================================
# OSINT
# ===========================================================================
maigret-mcp:
build:
context: ./osint/maigret-mcp
dockerfile: Dockerfile
image: maigret-mcp:latest
container_name: maigret-mcp
ports:
- "3033:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '1'
memory: 512M

dnstwist-mcp:
build:
context: ./osint/dnstwist-mcp
dockerfile: Dockerfile
image: dnstwist-mcp:latest
container_name: dnstwist-mcp
ports:
- "3034:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '1'
memory: 512M

# ===========================================================================
# Threat Intelligence (additional)
# ===========================================================================
virustotal-mcp:
build:
context: ./threat-intel/virustotal-mcp
dockerfile: Dockerfile
image: virustotal-mcp:latest
container_name: virustotal-mcp
environment:
- VIRUSTOTAL_API_KEY=${VIRUSTOTAL_API_KEY:-}
ports:
- "3035:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '0.5'
memory: 256M

# ===========================================================================
# Active Directory
# ===========================================================================
bloodhound-mcp:
build:
context: ./active-directory/bloodhound-mcp
dockerfile: Dockerfile
image: bloodhound-mcp:latest
container_name: bloodhound-mcp
ports:
- "3036:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '1'
memory: 1G

# ===========================================================================
# Password Cracking
# ===========================================================================
hashcat-mcp:
build:
context: ./password-cracking/hashcat-mcp
dockerfile: Dockerfile
image: hashcat-mcp:latest
container_name: hashcat-mcp
ports:
- "3037:3000"
networks:
- mcp-network
restart: unless-stopped
security_opt:
- no-new-privileges:true
cap_drop:
- ALL
deploy:
resources:
limits:
cpus: '2'
memory: 2G

# =============================================================================
# Networks
# =============================================================================
Expand Down
2 changes: 2 additions & 0 deletions scripts/generate_docs.py
Original file line number Diff line number Diff line change
Expand Up @@ -195,9 +195,11 @@ def generate_site():
'Reconnaissance': {'icon': 'bi-search', 'color': '#3498db'},
'Web Security': {'icon': 'bi-globe', 'color': '#e74c3c'},
'Binary Analysis': {'icon': 'bi-file-binary', 'color': '#9b59b6'},
'Blockchain Security': {'icon': 'bi-currency-bitcoin', 'color': '#f7931a'},
'Cloud Security': {'icon': 'bi-cloud', 'color': '#1abc9c'},
'Secrets Detection': {'icon': 'bi-key', 'color': '#f39c12'},
'Exploitation': {'icon': 'bi-bug', 'color': '#c0392b'},
'Fuzzing': {'icon': 'bi-shuffle', 'color': '#e67e22'},
'OSINT': {'icon': 'bi-person-badge', 'color': '#2980b9'},
'Threat Intelligence': {'icon': 'bi-shield-exclamation', 'color': '#8e44ad'},
'Active Directory': {'icon': 'bi-diagram-3', 'color': '#27ae60'},
Expand Down
Loading