FuzzingLabs/mcp-security-hub

GitHub: FuzzingLabs/mcp-security-hub

一个将 38 个 MCP 服务器和 300+ 攻防安全工具 Docker 化的集成平台,让 AI 助手通过自然语言调用 Nmap、Nuclei、Ghidra 等工具完成从侦察到漏洞分析的全流程安全评估。

Stars: 457 | Forks: 62

# 攻击安全 MCP 服务器 [![Build Status](https://static.pigsec.cn/wp-content/uploads/repos/2026/03/1544ba1b88212319.svg)](https://github.com/FuzzingLabs/mcp-security-hub/actions/workflows/build.yml) [![Security Scan](https://static.pigsec.cn/wp-content/uploads/repos/2026/03/5b64643b33212321.svg)](https://github.com/FuzzingLabs/mcp-security-hub/actions/workflows/security-scan.yml) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT) [![MCP Protocol](https://img.shields.io/badge/MCP-Protocol-blue.svg)](https://modelcontextprotocol.io/) 生产级、Docker 化的 MCP (Model Context Protocol) 服务器,专为攻击安全工具设计。支持 Claude 等 AI 助手执行安全评估、漏洞扫描和二进制分析。

38 MCPs 300+ Tools Docker Ready

## 功能特性 - **38 个 MCP 服务器**,涵盖侦察、Web 安全、二进制分析、区块链安全、云安全、代码安全、密钥检测、威胁情报、OSINT、Active Directory、Fuzzing 等 - **300+ 安全工具**,可通过 Claude 或其他 MCP 客户端使用自然语言访问 - **生产级加固** - 非 root 容器、最小化镜像、Trivy 扫描 - **Docker Compose** 编排,支持多工具工作流 - **CI/CD 就绪**,包含 GitHub Actions 用于自动化构建和安全扫描 ## 快速开始 ``` # Clone 仓库 git clone https://github.com/FuzzingLabs/mcp-security-hub cd mcp-security-hub # 构建所有 MCP servers docker-compose build # 启动特定 servers docker-compose up nmap-mcp nuclei-mcp -d # 验证健康状态 docker-compose ps ``` ### 配置 Claude Desktop / Claude Code **重要:** 使用前必须先使用 `docker-compose build` 构建镜像。 将示例配置复制到您的 Claude Desktop 配置文件中: **macOS**: `~/Library/Application Support/Claude/claude_desktop_config.json` **Windows**: `%APPDATA%\Claude\claude_desktop_config.json` ``` { "mcpServers": { "nmap": { "command": "docker", "args": ["run", "-i", "--rm", "--cap-add=NET_RAW", "nmap-mcp:latest"] }, "nuclei": { "command": "docker", "args": ["run", "-i", "--rm", "nuclei-mcp:latest"] }, "gitleaks": { "command": "docker", "args": ["run", "-i", "--rm", "-v", "/path/to/repos:/app/target:ro", "gitleaks-mcp:latest"] }, "radare2": { "command": "docker", "args": ["run", "-i", "--rm", "-v", "/path/to/binaries:/samples:ro", "radare2-mcp:latest"] } } } ``` 对于项目级配置,请将 `.mcp.json` 复制到项目根目录。有关包含所有 MCP 和卷挂载模式的完整配置模板,请参阅 [examples/](./examples/)。 ## 可用的 MCP 服务器 ### 侦察 (8 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [nmap-mcp](./reconnaissance/nmap-mcp) | 8 | 端口扫描、服务检测、OS 指纹识别、NSE 脚本 | | [shodan-mcp](./reconnaissance/shodan-mcp) | - | [官方 Shodan MCP](https://github.com/BurtTheCoder/mcp-shodan) 的封装 | | [pd-tools-mcp](./reconnaissance/pd-tools-mcp) | - | [ProjectDiscovery 工具](https://github.com/intelligent-ears/pd-tools-mcp) 的封装 (subfinder, httpx, katana) | | [whatweb-mcp](./reconnaissance/whatweb-mcp) | 5 | Web 技术指纹识别和 CMS 检测 | | [masscan-mcp](./reconnaissance/masscan-mcp) | 6 | 针对大型网络的高速端口扫描 | | [zoomeye-mcp](./reconnaissance/zoomeye-mcp) | - | [ZoomEye MCP](https://github.com/zoomeye-ai/mcp_zoomeye) 的封装 - 网络空间搜索引擎 | | [networksdb-mcp](./reconnaissance/networksdb-mcp) | 4 | 通过 [NetworksDB](https://github.com/MorDavid/NetworksDB-MCP) 进行 IP/ASN/DNS 查询 | | [externalattacker-mcp](./reconnaissance/externalattacker-mcp) | 6 | 使用 [ExternalAttacker](https://github.com/MorDavid/ExternalAttacker-MCP) 进行攻击面映射 | ### Web 安全 (6 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [nuclei-mcp](./web-security/nuclei-mcp) | 7 | 基于模板的漏洞扫描,拥有 8000+ 模板 | | [sqlmap-mcp](./web-security/sqlmap-mcp) | 8 | SQL 注入检测和利用 | | [nikto-mcp](./web-security/nikto-mcp) | - | [Nikto MCP](https://github.com/weldpua2008/nikto-mcp) Web 服务器扫描器的封装 | | [ffuf-mcp](./web-security/ffuf-mcp) | 9 | Web Fuzzing,用于目录、文件、参数和虚拟主机 | | [waybackurls-mcp](./web-security/waybackurls-mcp) | 3 | 从 Wayback Machine 获取历史 URL 用于侦察 | | [burp-mcp](./web-security/burp-mcp) | - | [官方 Burp Suite MCP](https://github.com/PortSwigger/mcp-server) 的封装 | ### 二进制分析 (6 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [radare2-mcp](./binary-analysis/radare2-mcp) | 32 | [官方 radare2-mcp](https://github.com/radareorg/radare2-mcp) 的封装 - 反汇编、反编译 | | [binwalk-mcp](./binary-analysis/binwalk-mcp) | 6 | 固件分析、签名扫描、提取 | | [yara-mcp](./binary-analysis/yara-mcp) | 7 | 用于恶意软件分类的模式匹配 | | [capa-mcp](./binary-analysis/capa-mcp) | 5 | 可执行文件中的能力检测 | | [ghidra-mcp](./binary-analysis/ghidra-mcp) | - | [pyghidra-mcp](https://github.com/clearbluejar/pyghidra-mcp) 的封装 - 无头 AI 驱动的逆向工程 | | [ida-mcp](./binary-analysis/ida-mcp) | - | [ida-pro-mcp](https://github.com/mrexodia/ida-pro-mcp) 的封装 - IDA Pro 集成 | ### 区块链安全 (3 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [daml-viewer-mcp](./blockchain/daml-viewer-mcp) | 1 | DAML 访问控制表生成和运行跟踪 | | [medusa-mcp](./blockchain/medusa-mcp) | 4 | 用于 Solidity 的高性能智能合约 Fuzzer | | [solazy-mcp](./blockchain/solazy-mcp) | 8 | Solana sBPF 静态分析和逆向工程 | ### 云安全 (3 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [trivy-mcp](./cloud-security/trivy-mcp) | 7 | 容器、文件系统和 IaC 漏洞扫描 | | [prowler-mcp](./cloud-security/prowler-mcp) | 6 | AWS/Azure/GCP 安全审计和合规性检查 | | [roadrecon-mcp](./cloud-security/roadrecon-mcp) | 6 | 通过 [RoadRecon](https://github.com/atomicchonk/roadrecon_mcp_server) 进行 Azure AD 枚举 | ### 密钥检测 (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [gitleaks-mcp](./secrets/gitleaks-mcp) | 5 | 在 git 仓库和文件中查找密钥和凭据 | ### 漏洞利用 (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [searchsploit-mcp](./exploitation/searchsploit-mcp) | 5 | Exploit-DB 搜索和检索 | ### Fuzzing (2 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [boofuzz-mcp](./fuzzing/boofuzz-mcp) | 4 | 使用 Boofuzz 进行网络协议 Fuzzing | | [dharma-mcp](./fuzzing/dharma-mcp) | 2 | 基于语法的测试用例生成 | ### OSINT (2 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [maigret-mcp](./osint/maigret-mcp) | - | [mcp-maigret](https://github.com/BurtTheCoder/mcp-maigret) 的封装 - 在 2500+ 个站点上进行用户名 OSINT | | [dnstwist-mcp](./osint/dnstwist-mcp) | - | [mcp-dnstwist](https://github.com/BurtTheCoder/mcp-dnstwist) 的封装 - 域名抢注/钓鱼检测 | ### 威胁情报 (2 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [virustotal-mcp](./threat-intel/virustotal-mcp) | - | [mcp-virustotal](https://github.com/BurtTheCoder/mcp-virustotal) 的封装 - 恶意软件分析和威胁情报 | | [otx-mcp](./threat-intel/otx-mcp) | - | [OTX MCP](https://github.com/mrwadams/otx-mcp) 的封装 - AlienVault Open Threat Exchange | ### Active Directory (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [bloodhound-mcp](./active-directory/bloodhound-mcp) | 75+ | [BloodHound-MCP-AI](https://github.com/MorDavid/BloodHound-MCP-AI) 的封装 - AD 攻击路径分析 | ### 密码破解 (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [hashcat-mcp](./password-cracking/hashcat-mcp) | - | [hashcat-mcp](https://github.com/MorDavid/hashcat-mcp) 的封装 - 自然语言哈希破解 | ### 代码安全 (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [semgrep-mcp](./code-security/semgrep-mcp) | 7 | [Semgrep MCP](https://github.com/semgrep/mcp) 的封装 - 静态代码分析,拥有 5000+ 规则 | ### 元工具 (1 个服务器) | Server | Tools | Description | |--------|-------|-------------| | [mcp-scan](./meta/mcp-scan) | - | [mcp-scan](https://github.com/invariantlabs-ai/mcp-scan) 的封装 - 扫描 MCP 服务器的漏洞 | ## 使用示例 ### 网络侦察 ``` You: "Scan 192.168.1.0/24 for web servers and identify technologies" Claude: I'll perform a network scan and technology fingerprinting. [Uses nmap-mcp to scan ports 80,443,8080] [Uses whatweb-mcp to fingerprint discovered hosts] Found 12 web servers: - 192.168.1.10: Apache 2.4.52, WordPress 6.4 - 192.168.1.15: nginx 1.24, React application ... ``` ### 漏洞评估 ``` You: "Check example.com for common vulnerabilities" Claude: I'll run a vulnerability scan using nuclei templates. [Uses nuclei-mcp with cves, exposures, and misconfigurations templates] Found 3 issues: - HIGH: CVE-2024-1234 - Outdated jQuery version - MEDIUM: Exposed .git directory - INFO: Missing security headers ``` ### 二进制分析 ``` You: "Analyze this firmware image for security issues" Claude: I'll extract and analyze the firmware. [Uses binwalk-mcp to extract filesystem] [Uses yara-mcp to scan for malware patterns] [Uses capa-mcp to identify capabilities] Analysis complete: - Extracted 847 files from SquashFS filesystem - Found hardcoded credentials in /etc/shadow - Identified network backdoor capability ``` ## 安全加固 所有容器均实施深度防御: | 控制措施 | 实现方式 | |---------|----------------| | **非 root 执行** | 以 `mcpuser` (UID 1000) 运行 | | **最小化镜像** | Alpine/Debian slim 基础镜像 | | **丢弃能力** | `cap_drop: ALL`, 选择性 `cap_add` | | **禁止权限提升** | `security_opt: no-new-privileges:true` | | **只读挂载** | 示例目录以只读方式挂载 | | **资源限制** | CPU 和内存约束 | | **健康检查** | 内置容器健康监控 | | **漏洞扫描** | CI/CD 流水线中的 Trivy 扫描 | ## 项目结构 ``` mcp-security-hub/ ├── reconnaissance/ │ ├── nmap-mcp/ # Port scanning │ ├── shodan-mcp/ # Internet device search (wrapper) │ ├── pd-tools-mcp/ # ProjectDiscovery tools (wrapper) │ ├── whatweb-mcp/ # Web fingerprinting │ ├── masscan-mcp/ # High-speed scanning │ ├── zoomeye-mcp/ # Cyberspace search (wrapper) │ ├── networksdb-mcp/ # IP/ASN/DNS lookups │ └── externalattacker-mcp/ # Attack surface mapping ├── web-security/ │ ├── nuclei-mcp/ # Vulnerability scanning │ ├── sqlmap-mcp/ # SQL injection │ ├── nikto-mcp/ # Web server scanning (wrapper) │ ├── ffuf-mcp/ # Web fuzzing │ └── burp-mcp/ # Burp Suite (wrapper) ├── binary-analysis/ │ ├── radare2-mcp/ # Reverse engineering (wrapper) │ ├── binwalk-mcp/ # Firmware analysis │ ├── yara-mcp/ # Malware detection │ ├── capa-mcp/ # Capability detection │ ├── ghidra-mcp/ # Ghidra RE - pyghidra-mcp (headless) │ └── ida-mcp/ # IDA Pro (wrapper) ├── blockchain/ │ ├── daml-viewer-mcp/ # DAML access-control analysis │ ├── medusa-mcp/ # Smart contract fuzzing │ └── solazy-mcp/ # Solana analysis ├── cloud-security/ │ ├── trivy-mcp/ # Container scanning (wrapper) │ ├── prowler-mcp/ # Cloud auditing │ └── roadrecon-mcp/ # Azure AD enumeration ├── code-security/ │ └── semgrep-mcp/ # Static code analysis (wrapper) ├── secrets/ │ └── gitleaks-mcp/ # Secrets detection ├── exploitation/ │ └── searchsploit-mcp/ # Exploit database ├── fuzzing/ │ ├── boofuzz-mcp/ # Network protocol fuzzing using Boofuzz │ └── dharma-mcp/ # Grammar-based test case generation ├── osint/ │ ├── maigret-mcp/ # Username OSINT (wrapper) │ └── dnstwist-mcp/ # Typosquatting detection (wrapper) ├── threat-intel/ │ ├── virustotal-mcp/ # Malware analysis (wrapper) │ └── otx-mcp/ # AlienVault OTX (wrapper) ├── active-directory/ │ └── bloodhound-mcp/ # AD attack paths (wrapper) ├── password-cracking/ │ └── hashcat-mcp/ # Hash cracking (wrapper) ├── meta/ │ └── mcp-scan/ # MCP security scanning ├── scripts/ │ ├── setup.sh # Quick setup │ └── healthcheck.sh # Health verification ├── tests/ │ └── test_mcp_servers.py # Unit tests ├── docker-compose.yml # Orchestration └── .github/workflows/ # CI/CD ``` ## 测试 ``` # 运行单元测试 pytest tests/ -v # 构建并测试所有 Docker images ./scripts/test_builds.sh # 测试 MCP 协议(构建后) echo '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' | \ docker run -i --rm nmap-mcp:latest ``` ## 法律与合规 **这些工具仅用于授权的安全测试。** 使用前: 1. **获取书面授权** 来自目标所有者 2. **定义范围** - 目标、时间表、允许的活动 3. **维护审计日志** 记录所有操作 4. **遵循负责任的披露** 针对任何发现 未经授权访问计算机系统是非法的。用户有责任遵守适用的法律。 ## 贡献 欢迎贡献!添加新的 MCP 服务器: 1. 使用 `Dockerfile.template` 作为起点 2. 遵循安全加固实践(非 root、最小化镜像) 3. 包含健康检查和详尽的 README 4. 确保 Trivy 扫描通过(无 HIGH/CRITICAL 漏洞) 5. 在 `tests/test_mcp_servers.py` 中添加测试 ## 致谢 - [Model Context Protocol](https://modelcontextprotocol.io/) - 协议规范 - [awesome-mcp-security](https://github.com/Puliczek/awesome-mcp-security) - MCP 安全目录 - 上游工具维护者:nmap, nuclei, radare2, sqlmap 以及所有其他工具 ## 许可证 MIT License - 详见 [LICENSE](./LICENSE)

FuzzingLabs 维护
让 AI 驱动的安全测试触手可及

标签:Active Directory, AD攻击面, AI 安全, Bitdefender, CISA项目, Claude, CVE检测, DLL 劫持, Docker 容器, DOE合作, ESC4, Ghidra, Google, Hashcat, MCP 协议, Model Context Protocol, Nmap, Nuclei, OSINT, Plaso, Secrets 检测, SQLMap, Web报告查看器, 二进制分析, 云安全运维, 云资产清单, 代码安全, 区块链安全, 大语言模型, 威胁情报, 安全专业人员, 安全工具集, 密码管理, 开发者工具, 插件系统, 攻击框架, 漏洞枚举, 版权保护, 结构化查询, 网络安全, 自动化安全, 自定义DNS解析器, 虚拟驱动器, 请求拦截, 进攻性安全, 逆向工具, 逆向工程, 隐私保护