MCP-SecurityTools  by Ta0ing

MCP tools collection for network security, enabling AI to use security tools

created 4 months ago
286 stars

Top 92.5% on sourcepulse

GitHubView on GitHub
Project Summary

This project curates and integrates various network security tools with the Model Context Protocol (MCP), enabling AI agents to leverage these tools for tasks like asset discovery, vulnerability scanning, and threat analysis. It targets AI developers and security researchers seeking to enhance LLM capabilities with practical security functionalities.

How It Works

MCP acts as a standardized interface, akin to USB-C for AI, allowing LLM applications to connect with diverse data sources and tools. The architecture follows a client-server model where an MCP Host (e.g., an AI application) connects to MCP Servers, which are lightweight programs exposing specific functionalities. These servers can access local data or remote services, facilitating seamless integration of security tools into AI workflows.

Quick Start & Requirements

  • Installation: Varies per tool; typically involves git clone and building from source (e.g., Go for uncover-mcp, Node.js for virustotal-mcp, pip for mcp-server-zoomeye).
  • Prerequisites: Go 1.21+ for some tools, Node.js for others, API keys for services like Shodan, Fofa, VirusTotal, and ZoomEye.
  • Setup: Requires compiling individual tool binaries and configuring them within an MCP host or specific AI platforms like Cherry Studio.
  • Documentation: Cherry Studio MCP Tutorial, ZoomEye MCP.

Highlighted Details

  • Integrates tools like uncover-mcp (Fofa/Shodan), ENScan_GO-MCP (info gathering), VirusTotal-MCP (analysis), cloudsword-MCP (cloud security), ZoomEye-MCP (asset discovery), and AWVS-MCP (vulnerability scanning).
  • Supports both SSE (Server-Sent Events) and STDIO communication protocols for tool integration.
  • Designed for flexibility, allowing AI agents to switch between LLM providers and manage data securely.

Maintenance & Community

  • The project appears to be actively maintained by Ta0ing and contributors from other linked repositories (e.g., Co5mos, wgpsec, BurtTheCoder).
  • Links to specific tool repositories are provided for detailed information.

Licensing & Compatibility

  • Licenses vary per integrated tool; specific licenses are not consolidated in the main README. Users must check individual tool repositories.
  • Compatibility for commercial use depends on the licenses of the individual integrated tools.

Limitations & Caveats

  • Several tools are marked as "待更新,计划中" (to be updated, planned), indicating incomplete functionality or ongoing development.
  • The README notes that cloudsword-MCP via cline is currently untested.
  • API key management is crucial for most tools, requiring users to obtain and configure their own keys.
Health Check
Last commit

3 months ago

Responsiveness

Inactive

Pull Requests (30d)
0
Issues (30d)
0
Star History
63 stars in the last 90 days

Explore Similar Projects

Feedback? Help us improve.