MCPHub LabRegistrymcp-security-hub
FuzzingLabs

mcp security hub

Built by FuzzingLabs • 495 stars

What is mcp security hub?

A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.

How to use mcp security hub?

1. Install a compatible MCP client (like Claude Desktop). 2. Open your configuration settings. 3. Add mcp security hub using the following command: npx @modelcontextprotocol/mcp-security-hub 4. Restart the client and verify the new tools are active.
šŸ›”ļø Scoped (Restricted)
npx @modelcontextprotocol/mcp-security-hub --scope restricted
šŸ”“ Unrestricted Access
npx @modelcontextprotocol/mcp-security-hub

Key Features

Native MCP Protocol Support
Real-time Tool Activation & Execution
Verified High-performance Implementation
Secure Resource & Context Handling

Optimized Use Cases

Extending AI models with custom local capabilities
Automating system workflows via natural language
Connecting external data sources to LLM context windows

mcp security hub FAQ

Q

Is mcp security hub safe?

Yes, mcp security hub follows the standardized Model Context Protocol security patterns and only executes tools with explicit user-granted permissions.

Q

Is mcp security hub up to date?

mcp security hub is currently active in the registry with 495 stars on GitHub, indicating its reliability and community support.

Q

Are there any limits for mcp security hub?

Usage limits depend on the specific implementation of the MCP server and your system resources. Refer to the official documentation below for technical details.

Official Documentation

View on GitHub

Offensive Security MCP Servers

Build Status Security Scan License: MIT MCP Protocol

Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.

<p align="center"> <img src="https://img.shields.io/badge/MCPs-38-brightgreen" alt="38 MCPs"/> <img src="https://img.shields.io/badge/Tools-300+-orange" alt="300+ Tools"/> <img src="https://img.shields.io/badge/Docker-Ready-blue" alt="Docker Ready"/> </p>

Features

  • 38 MCP Servers covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, fuzzing, and more
  • 300+ Security Tools accessible via natural language through Claude or other MCP clients
  • Production Hardened - Non-root containers, minimal images, Trivy-scanned
  • Docker Compose orchestration for multi-tool workflows
  • CI/CD Ready with GitHub Actions for automated builds and security scanning

Quick Start

# Clone the repository
git clone https://github.com/FuzzingLabs/mcp-security-hub
cd mcp-security-hub

# Build all MCP servers
docker-compose build

# Start specific servers
docker-compose up nmap-mcp nuclei-mcp -d

# Verify health
docker-compose ps

Configure Claude Desktop / Claude Code

Important: You must build the images first with docker-compose build before using them.

Copy the example config to your Claude Desktop configuration:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json

Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "nmap": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "--cap-add=NET_RAW", "nmap-mcp:latest"]
    },
    "nuclei": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "nuclei-mcp:latest"]
    },
    "gitleaks": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "-v", "/path/to/repos:/app/target:ro", "gitleaks-mcp:latest"]
    },
    "radare2": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "-v", "/path/to/binaries:/samples:ro", "radare2-mcp:latest"]
    }
  }
}

For project-level config, copy .mcp.json to your project root. See examples/ for full configuration templates with all MCPs and volume mount patterns.

Available MCP Servers

Reconnaissance (8 servers)

ServerToolsDescription
nmap-mcp8Port scanning, service detection, OS fingerprinting, NSE scripts
shodan-mcp-Wrapper for official Shodan MCP
pd-tools-mcp-Wrapper for ProjectDiscovery tools (subfinder, httpx, katana)
whatweb-mcp5Web technology fingerprinting and CMS detection
masscan-mcp6High-speed port scanning for large networks
zoomeye-mcp-Wrapper for ZoomEye MCP - Cyberspace search engine
networksdb-mcp4IP/ASN/DNS lookups via NetworksDB
externalattacker-mcp6Attack surface mapping with ExternalAttacker

Web Security (6 servers)

ServerToolsDescription
nuclei-mcp7Template-based vulnerability scanning with 8000+ templates
sqlmap-mcp8SQL injection detection and exploitation
nikto-mcp-Wrapper for Nikto MCP web server scanner
ffuf-mcp9Web fuzzing for directories, files, parameters, and virtual hosts
waybackurls-mcp3Fetch historical URLs from Wayback Machine for reconnaissance
burp-mcp-Wrapper for official Burp Suite MCP

Binary Analysis (6 servers)

ServerToolsDescription
radare2-mcp32Wrapper for official radare2-mcp - disassembly, decompilation
binwalk-mcp6Firmware analysis, signature scanning, extraction
yara-mcp7Pattern matching for malware classification
capa-mcp5Capability detection in executables
ghidra-mcp-Wrapper for pyghidra-mcp - Headless AI-powered reverse engineering
ida-mcp-Wrapper for ida-pro-mcp - IDA Pro integration

Blockchain Security (3 servers)

ServerToolsDescription
daml-viewer-mcp1DAML access-control table generation and run tracking
medusa-mcp4High-performance smart contract fuzzer for Solidity
solazy-mcp8Solana sBPF static analysis and reverse engineering

Cloud Security (3 servers)

ServerToolsDescription
trivy-mcp7Container, filesystem, and IaC vulnerability scanning
prowler-mcp6AWS/Azure/GCP security auditing and compliance
roadrecon-mcp6Azure AD enumeration via RoadRecon

Secrets Detection (1 server)

ServerToolsDescription
gitleaks-mcp5Find secrets and credentials in git repos and files

Exploitation (1 server)

ServerToolsDescription
searchsploit-mcp5Exploit-DB search and retrieval

Fuzzing (2 servers)

ServerToolsDescription
boofuzz-mcp4Network protocol fuzzing using Boofuzz
dharma-mcp2Grammar-based test case generation

OSINT (2 servers)

ServerToolsDescription
maigret-mcp-Wrapper for mcp-maigret - Username OSINT across 2500+ sites
dnstwist-mcp-Wrapper for mcp-dnstwist - Typosquatting/phishing detection

Threat Intelligence (2 servers)

ServerToolsDescription
virustotal-mcp-Wrapper for mcp-virustotal - Malware analysis and threat intel
otx-mcp-Wrapper for OTX MCP - AlienVault Open Threat Exchange

Active Directory (1 server)

ServerToolsDescription
bloodhound-mcp75+Wrapper for BloodHound-MCP-AI - AD attack path analysis

Password Cracking (1 server)

ServerToolsDescription
hashcat-mcp-Wrapper for hashcat-mcp - Natural language hash cracking

Code Security (1 server)

ServerToolsDescription
semgrep-mcp7Wrapper for Semgrep MCP - Static code analysis with 5000+ rules

Meta (1 server)

ServerToolsDescription
mcp-scan-Wrapper for mcp-scan - Scan MCP servers for vulnerabilities

Usage Examples

Network Reconnaissance

You: "Scan 192.168.1.0/24 for web servers and identify technologies"

Claude: I'll perform a network scan and technology fingerprinting.
[Uses nmap-mcp to scan ports 80,443,8080]
[Uses whatweb-mcp to fingerprint discovered hosts]

Found 12 web servers:
- 192.168.1.10: Apache 2.4.52, WordPress 6.4
- 192.168.1.15: nginx 1.24, React application
...

Vulnerability Assessment

You: "Check example.com for common vulnerabilities"

Claude: I'll run a vulnerability scan using nuclei templates.
[Uses nuclei-mcp with cves, exposures, and misconfigurations templates]

Found 3 issues:
- HIGH: CVE-2024-1234 - Outdated jQuery version
- MEDIUM: Exposed .git directory
- INFO: Missing security headers

Binary Analysis

You: "Analyze this firmware image for security issues"

Claude: I'll extract and analyze the firmware.
[Uses binwalk-mcp to extract filesystem]
[Uses yara-mcp to scan for malware patterns]
[Uses capa-mcp to identify capabilities]

Analysis complete:
- Extracted 847 files from SquashFS filesystem
- Found hardcoded credentials in /etc/shadow
- Identified network backdoor capability

Security Hardening

All containers implement defense-in-depth:

ControlImplementation
Non-root executionRuns as mcpuser (UID 1000)
Minimal imagesAlpine/Debian slim base images
Dropped capabilitiescap_drop: ALL, selective cap_add
No privilege escalationsecurity_opt: no-new-privileges:true
Read-only mountsSample directories mounted read-only
Resource limitsCPU and memory constraints
Health checksBuilt-in container health monitoring
Vulnerability scanningTrivy scans in CI/CD pipeline

Project Structure

mcp-security-hub/
ā”œā”€ā”€ reconnaissance/
│   ā”œā”€ā”€ nmap-mcp/           # Port scanning
│   ā”œā”€ā”€ shodan-mcp/         # Internet device search (wrapper)
│   ā”œā”€ā”€ pd-tools-mcp/       # ProjectDiscovery tools (wrapper)
│   ā”œā”€ā”€ whatweb-mcp/        # Web fingerprinting
│   ā”œā”€ā”€ masscan-mcp/        # High-speed scanning
│   ā”œā”€ā”€ zoomeye-mcp/        # Cyberspace search (wrapper)
│   ā”œā”€ā”€ networksdb-mcp/     # IP/ASN/DNS lookups
│   └── externalattacker-mcp/ # Attack surface mapping
ā”œā”€ā”€ web-security/
│   ā”œā”€ā”€ nuclei-mcp/         # Vulnerability scanning
│   ā”œā”€ā”€ sqlmap-mcp/         # SQL injection
│   ā”œā”€ā”€ nikto-mcp/          # Web server scanning (wrapper)
│   ā”œā”€ā”€ ffuf-mcp/           # Web fuzzing
│   └── burp-mcp/           # Burp Suite (wrapper)
ā”œā”€ā”€ binary-analysis/
│   ā”œā”€ā”€ radare2-mcp/        # Reverse engineering (wrapper)
│   ā”œā”€ā”€ binwalk-mcp/        # Firmware analysis
│   ā”œā”€ā”€ yara-mcp/           # Malware detection
│   ā”œā”€ā”€ capa-mcp/           # Capability detection
│   ā”œā”€ā”€ ghidra-mcp/         # Ghidra RE - pyghidra-mcp (headless)
│   └── ida-mcp/            # IDA Pro (wrapper)
ā”œā”€ā”€ blockchain/
│   ā”œā”€ā”€ daml-viewer-mcp/    # DAML access-control analysis
│   ā”œā”€ā”€ medusa-mcp/         # Smart contract fuzzing
│   └── solazy-mcp/         # Solana analysis
ā”œā”€ā”€ cloud-security/
│   ā”œā”€ā”€ trivy-mcp/          # Container scanning (wrapper)
│   ā”œā”€ā”€ prowler-mcp/        # Cloud auditing
│   └── roadrecon-mcp/      # Azure AD enumeration
ā”œā”€ā”€ code-security/
│   └── semgrep-mcp/        # Static code analysis (wrapper)
ā”œā”€ā”€ secrets/
│   └── gitleaks-mcp/       # Secrets detection
ā”œā”€ā”€ exploitation/
│   └── searchsploit-mcp/   # Exploit database
ā”œā”€ā”€ fuzzing/
│   ā”œā”€ā”€ boofuzz-mcp/        # Network protocol fuzzing using Boofuzz
│   └── dharma-mcp/         # Grammar-based test case generation
ā”œā”€ā”€ osint/
│   ā”œā”€ā”€ maigret-mcp/        # Username OSINT (wrapper)
│   └── dnstwist-mcp/       # Typosquatting detection (wrapper)
ā”œā”€ā”€ threat-intel/
│   ā”œā”€ā”€ virustotal-mcp/     # Malware analysis (wrapper)
│   └── otx-mcp/            # AlienVault OTX (wrapper)
ā”œā”€ā”€ active-directory/
│   └── bloodhound-mcp/     # AD attack paths (wrapper)
ā”œā”€ā”€ password-cracking/
│   └── hashcat-mcp/        # Hash cracking (wrapper)
ā”œā”€ā”€ meta/
│   └── mcp-scan/           # MCP security scanning
ā”œā”€ā”€ scripts/
│   ā”œā”€ā”€ setup.sh            # Quick setup
│   └── healthcheck.sh      # Health verification
ā”œā”€ā”€ tests/
│   └── test_mcp_servers.py # Unit tests
ā”œā”€ā”€ docker-compose.yml      # Orchestration
└── .github/workflows/      # CI/CD

Testing

# Run unit tests
pytest tests/ -v

# Build and test all Docker images
./scripts/test_builds.sh

# Test MCP protocol (after building)
echo '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' | \
  docker run -i --rm nmap-mcp:latest

Legal & Compliance

These tools are for authorized security testing only.

Before using:

  1. Obtain written authorization from the target owner
  2. Define scope - targets, timeline, allowed activities
  3. Maintain audit logs of all operations
  4. Follow responsible disclosure for any findings

Unauthorized access to computer systems is illegal. Users are responsible for compliance with applicable laws.

Contributing

Contributions welcome! To add a new MCP server:

  1. Use Dockerfile.template as your starting point
  2. Follow security hardening practices (non-root, minimal image)
  3. Include health checks and comprehensive README
  4. Ensure Trivy scan passes (no HIGH/CRITICAL vulnerabilities)
  5. Add tests to tests/test_mcp_servers.py

Acknowledgments

License

MIT License - See LICENSE


<p align="center"> <strong>Maintained by <a href="https://fuzzinglabs.com">FuzzingLabs</a></strong> <br> <sub>Making AI-powered security testing accessible</sub> </p>

Global Ranking

-
Trust ScoreMCPHub Index

Based on codebase health & activity.

Manual Config

{ "mcpServers": { "mcp-security-hub": { "command": "npx", "args": ["mcp-security-hub"] } } }