You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Production-ready, Dockerized MCP (Model Context Protocol) servers for offensive security tools. Enable AI assistants like Claude to perform security assessments, vulnerability scanning, and binary analysis.
Features
36 MCP Servers covering reconnaissance, web security, binary analysis, blockchain security, cloud security, code security, secrets detection, threat intelligence, OSINT, Active Directory, and more
175+ Security Tools accessible via natural language through Claude or other MCP clients
Production Hardened - Non-root containers, minimal images, Trivy-scanned
Docker Compose orchestration for multi-tool workflows
CI/CD Ready with GitHub Actions for automated builds and security scanning
Quick Start
# Clone the repository
git clone https://github.com/FuzzingLabs/mcp-security-hub
cd mcp-security-hub
# Build all MCP servers
docker-compose build
# Start specific servers
docker-compose up nmap-mcp nuclei-mcp -d
# Verify health
docker-compose ps
Configure Claude Desktop / Claude Code
Important: You must build the images first with docker-compose build before using them.
Copy the example config to your Claude Desktop configuration:
Wrapper for mcp-scan - Scan MCP servers for vulnerabilities
Usage Examples
Network Reconnaissance
You: "Scan 192.168.1.0/24 for web servers and identify technologies"
Claude: I'll perform a network scan and technology fingerprinting.
[Uses nmap-mcp to scan ports 80,443,8080]
[Uses whatweb-mcp to fingerprint discovered hosts]
Found 12 web servers:
- 192.168.1.10: Apache 2.4.52, WordPress 6.4
- 192.168.1.15: nginx 1.24, React application
...
Vulnerability Assessment
You: "Check example.com for common vulnerabilities"
Claude: I'll run a vulnerability scan using nuclei templates.
[Uses nuclei-mcp with cves, exposures, and misconfigurations templates]
Found 3 issues:
- HIGH: CVE-2024-1234 - Outdated jQuery version
- MEDIUM: Exposed .git directory
- INFO: Missing security headers
Binary Analysis
You: "Analyze this firmware image for security issues"
Claude: I'll extract and analyze the firmware.
[Uses binwalk-mcp to extract filesystem]
[Uses yara-mcp to scan for malware patterns]
[Uses capa-mcp to identify capabilities]
Analysis complete:
- Extracted 847 files from SquashFS filesystem
- Found hardcoded credentials in /etc/shadow
- Identified network backdoor capability
# Run unit tests
pytest tests/ -v
# Build and test all Docker images
./scripts/test_builds.sh
# Test MCP protocol (after building)echo'{"jsonrpc":"2.0","id":1,"method":"tools/list"}'| \
docker run -i --rm nmap-mcp:latest
Legal & Compliance
These tools are for authorized security testing only.
Before using:
Obtain written authorization from the target owner