MCP-SecurityTools  by Ta0ing

MCP tools collection for network security, enabling AI to use security tools

Created 5 months ago
340 stars

Top 81.1% on SourcePulse

GitHubView on GitHub
Project Summary

This project curates and integrates various network security tools with the Model Context Protocol (MCP), enabling AI agents to leverage these tools for tasks like asset discovery, vulnerability scanning, and threat analysis. It targets AI developers and security researchers seeking to enhance LLM capabilities with practical security functionalities.

How It Works

MCP acts as a standardized interface, akin to USB-C for AI, allowing LLM applications to connect with diverse data sources and tools. The architecture follows a client-server model where an MCP Host (e.g., an AI application) connects to MCP Servers, which are lightweight programs exposing specific functionalities. These servers can access local data or remote services, facilitating seamless integration of security tools into AI workflows.

Quick Start & Requirements

  • Installation: Varies per tool; typically involves git clone and building from source (e.g., Go for uncover-mcp, Node.js for virustotal-mcp, pip for mcp-server-zoomeye).
  • Prerequisites: Go 1.21+ for some tools, Node.js for others, API keys for services like Shodan, Fofa, VirusTotal, and ZoomEye.
  • Setup: Requires compiling individual tool binaries and configuring them within an MCP host or specific AI platforms like Cherry Studio.
  • Documentation: Cherry Studio MCP Tutorial, ZoomEye MCP.

Highlighted Details

  • Integrates tools like uncover-mcp (Fofa/Shodan), ENScan_GO-MCP (info gathering), VirusTotal-MCP (analysis), cloudsword-MCP (cloud security), ZoomEye-MCP (asset discovery), and AWVS-MCP (vulnerability scanning).
  • Supports both SSE (Server-Sent Events) and STDIO communication protocols for tool integration.
  • Designed for flexibility, allowing AI agents to switch between LLM providers and manage data securely.

Maintenance & Community

  • The project appears to be actively maintained by Ta0ing and contributors from other linked repositories (e.g., Co5mos, wgpsec, BurtTheCoder).
  • Links to specific tool repositories are provided for detailed information.

Licensing & Compatibility

  • Licenses vary per integrated tool; specific licenses are not consolidated in the main README. Users must check individual tool repositories.
  • Compatibility for commercial use depends on the licenses of the individual integrated tools.

Limitations & Caveats

  • Several tools are marked as "待更新,计划中" (to be updated, planned), indicating incomplete functionality or ongoing development.
  • The README notes that cloudsword-MCP via cline is currently untested.
  • API key management is crucial for most tools, requiring users to obtain and configure their own keys.
Health Check
Last Commit

5 months ago

Responsiveness

Inactive

Pull Requests (30d)
0
Issues (30d)
0
Star History
47 stars in the last 30 days

Explore Similar Projects

Starred by Chip Huyen Chip Huyen(Author of "AI Engineering", "Designing Machine Learning Systems"), Jason Knight Jason Knight(Director AI Compilers at NVIDIA; Cofounder of OctoML), and
10 more.

awesome-mcp-servers by punkpeye

1.5%
70k
Curated list of Model Context Protocol (MCP) servers
Created 9 months ago
Updated 2 days ago
Feedback? Help us improve.