mcp-for-security
MCP ServerFreeMCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.
Capabilities22 decomposed
mcp-standardized security tool abstraction layer
Medium confidenceWraps 19 battle-tested security tools (Nmap, SQLmap, Nuclei, FFUF, etc.) behind a unified Model Context Protocol interface, enabling AI assistants to invoke security operations through standardized tool schemas rather than direct CLI invocation. Each tool maintains its native functionality while exposing capabilities through MCP's resource and tool calling mechanisms, allowing clients to discover available security operations via introspection without tool-specific knowledge.
Implements MCP servers as thin wrappers around CLI tools using child_process execution with structured argument building and output parsing, rather than reimplementing tool logic or requiring native language bindings. Each tool directory contains independent MCP server with its own package.json, enabling modular deployment and version management.
Provides standardized MCP interface to security tools without requiring tool vendors to implement MCP natively, whereas alternatives like direct API integration require tool-specific SDKs or REST wrappers for each tool.
passive subdomain enumeration via multiple data sources
Medium confidenceImplements reconnaissance tools (Amass, Assetfinder, Certificate Search, Waybackurls, shuffledns) that gather attack surface information without active network traffic, using public data sources like SSL certificate transparency logs, DNS historical records, and archive.org. Amass provides advanced passive/active mode switching with configurable data source selection, while Assetfinder performs lightweight enumeration using only public sources for speed. These tools feed domain discovery into downstream scanning workflows.
Combines multiple independent reconnaissance tools (Amass, Assetfinder, Certificate Search, Waybackurls, shuffledns) into a unified MCP interface, allowing agents to orchestrate multi-source enumeration and deduplicate results across tools. Amass integration specifically exposes passive/active mode switching and data source configuration through MCP parameters.
Aggregates results from multiple public data sources through a single MCP interface, whereas standalone tools like Assetfinder only query one source type, requiring manual orchestration to combine results.
http request smuggling detection via smuggler
Medium confidenceIntegrates Smuggler's HTTP request smuggling detection capabilities through MCP, enabling agents to identify desynchronization vulnerabilities between frontend and backend HTTP parsers. Smuggler tests various HTTP request formatting techniques (CL.TE, TE.CL, TE.TE) to detect parser inconsistencies. The MCP wrapper handles test case generation and result interpretation, allowing agents to assess HTTP parsing security without understanding smuggling techniques.
Provides HTTP request smuggling detection through MCP by wrapping Smuggler's test case generation and response analysis. Handles interpretation of timing-based and behavior-based detection results, enabling agents to identify desynchronization vulnerabilities without understanding HTTP parsing internals.
Offers specialized HTTP smuggling detection, whereas generic web scanners like Nuclei require custom templates and manual testing for smuggling vulnerabilities.
cloud infrastructure security assessment via scout suite
Medium confidenceExposes Scout Suite's multi-cloud security assessment capabilities through MCP, enabling agents to audit AWS, Azure, GCP, and other cloud provider configurations for security misconfigurations. Scout Suite performs API-based reconnaissance to enumerate cloud resources and assess compliance with security best practices. The MCP wrapper handles cloud provider authentication, resource enumeration, and result parsing, converting Scout Suite's detailed findings into structured security assessments.
Provides multi-cloud security assessment through MCP by wrapping Scout Suite's API-based enumeration and compliance checking. Handles cloud provider authentication and resource discovery, enabling agents to audit cloud infrastructure without understanding cloud provider APIs.
Offers multi-cloud security assessment with API-based resource enumeration, whereas manual cloud auditing requires deep knowledge of each cloud provider's API and security best practices.
mobile application security testing via mobsf
Medium confidenceIntegrates MobSF (Mobile Security Framework) through MCP for automated mobile application security assessment. MobSF performs static and dynamic analysis on Android and iOS applications, identifying security vulnerabilities, insecure configurations, and code quality issues. The MCP wrapper handles APK/IPA file upload, analysis execution, and result parsing, converting MobSF's detailed findings into structured security assessments.
Provides mobile application security assessment through MCP by wrapping MobSF's static and dynamic analysis engines. Handles APK/IPA file processing and result parsing, enabling agents to analyze mobile applications without understanding mobile security testing methodologies.
Offers automated mobile security testing with both static and dynamic analysis, whereas manual mobile security testing requires expertise in Android/iOS security and reverse engineering.
web crawling and javascript-aware reconnaissance via katana
Medium confidenceExposes Katana's web crawling capabilities through MCP, enabling agents to discover web application endpoints and parameters through hybrid crawling that parses JavaScript. Katana performs both traditional link-following crawling and JavaScript execution to discover dynamically-generated endpoints. The MCP wrapper handles crawl configuration, scope management, and result parsing, allowing agents to map application attack surface without manual crawling.
Provides JavaScript-aware web crawling through MCP by wrapping Katana's hybrid crawling engine that executes JavaScript to discover dynamically-generated endpoints. Handles crawl scope management and result parsing, enabling agents to map SPA attack surface without understanding JavaScript execution.
Offers JavaScript-aware crawling that discovers dynamically-generated endpoints, whereas traditional crawlers like Burp Suite only follow static links and miss JavaScript-generated content.
dns brute-forcing and mass subdomain resolution via shuffledns
Medium confidenceIntegrates shuffledns's high-speed DNS brute-forcing and mass resolution capabilities through MCP, enabling agents to discover subdomains through wordlist-based DNS queries and resolve large subdomain lists efficiently. shuffledns uses concurrent DNS queries with configurable resolver lists to achieve high-speed resolution. The MCP wrapper handles wordlist selection, resolver configuration, and result parsing, allowing agents to enumerate DNS records without manual DNS tool configuration.
Provides high-speed DNS brute-forcing and mass resolution through MCP by wrapping shuffledns's concurrent DNS query engine. Handles resolver configuration and result parsing, enabling agents to enumerate DNS records without understanding DNS protocol or resolver selection.
Offers high-speed DNS brute-forcing with concurrent query support, whereas sequential DNS tools like dig are significantly slower for large-scale enumeration.
historical url and archive discovery via waybackurls
Medium confidenceExposes Waybackurls's integration with Archive.org's Wayback Machine through MCP, enabling agents to discover historical URLs and archived versions of web applications. Waybackurls queries the Wayback Machine API to retrieve all captured URLs for a domain, providing insight into application evolution and potentially exposing forgotten endpoints or parameters. The MCP wrapper handles Wayback Machine API queries and result parsing.
Provides historical URL discovery through MCP by querying Archive.org's Wayback Machine API and parsing results. Enables agents to discover forgotten endpoints and parameters through archived versions without understanding Wayback Machine API mechanics.
Offers historical URL discovery through Archive.org integration, whereas manual Wayback Machine browsing is time-consuming and difficult to automate at scale.
ssl certificate transparency log querying via certificate search
Medium confidenceIntegrates certificate transparency log querying through MCP, enabling agents to discover subdomains by searching SSL certificate logs. Certificate transparency logs are public records of all issued SSL certificates, containing Subject Alternative Names (SANs) that reveal subdomains. The MCP wrapper handles certificate log queries and SAN extraction, allowing agents to discover subdomains without active DNS queries.
Provides passive subdomain discovery through MCP by querying SSL certificate transparency logs and extracting Subject Alternative Names. Enables agents to discover subdomains without active DNS queries or network traffic.
Offers passive certificate-based subdomain discovery that generates no network traffic, whereas active DNS brute-forcing may be detected by monitoring systems.
subdomain enumeration with advanced passive/active modes via amass
Medium confidenceExposes Amass's comprehensive subdomain enumeration capabilities through MCP with configurable passive and active reconnaissance modes. Amass integrates multiple data sources (DNS, WHOIS, SSL certificates, search engines, APIs) and supports active DNS queries, brute-forcing, and alterations. The MCP wrapper handles data source configuration, mode selection, and result deduplication, allowing agents to perform thorough subdomain enumeration without understanding Amass's complex configuration.
Provides comprehensive subdomain enumeration through MCP by wrapping Amass's multi-source integration and passive/active mode switching. Handles data source configuration and result deduplication, enabling agents to perform thorough reconnaissance without understanding Amass's complex configuration.
Offers multi-source subdomain enumeration with passive/active mode flexibility, whereas single-source tools like Assetfinder provide only passive enumeration from one data source.
passive asset discovery via public data sources with assetfinder
Medium confidenceIntegrates Assetfinder's lightweight passive asset discovery through MCP, enabling agents to quickly enumerate subdomains using only public data sources (SSL certificates, search engines, DNS records). Assetfinder prioritizes speed over comprehensiveness, making it ideal for rapid initial reconnaissance. The MCP wrapper handles data source queries and result parsing, allowing agents to perform fast passive enumeration without network traffic.
Provides lightweight passive asset discovery through MCP by querying public data sources without active network traffic. Prioritizes speed over comprehensiveness, enabling rapid initial reconnaissance.
Offers fast passive enumeration ideal for initial reconnaissance, whereas comprehensive tools like Amass are slower but discover more subdomains through multiple sources and active techniques.
http service probing and validation via httpx
Medium confidenceExposes httpx's multi-purpose HTTP toolkit through MCP for probing and validating web services. httpx performs HTTP requests to identify live hosts, extract response metadata (status codes, headers, titles, technologies), and validate service accessibility. The MCP wrapper handles request configuration, response parsing, and technology detection, allowing agents to assess web service availability and gather metadata without manual HTTP requests.
Provides HTTP service probing and technology detection through MCP by wrapping httpx's multi-purpose HTTP toolkit. Handles response parsing and technology signature matching, enabling agents to validate service accessibility and gather metadata without understanding HTTP protocol details.
Offers fast HTTP probing with technology detection, whereas manual HTTP requests require custom parsing logic for each response type.
template-based vulnerability scanning with nuclei
Medium confidenceExposes Nuclei's template-driven scanning engine through MCP, enabling AI agents to execute pre-built vulnerability detection templates against targets without writing custom detection logic. Nuclei maintains an extensive community template library covering OWASP Top 10, CVEs, and misconfigurations. The MCP wrapper handles template selection, severity filtering, and output parsing, converting Nuclei's JSON results into structured vulnerability findings with remediation context.
Wraps Nuclei's template engine with MCP parameter binding for severity filtering, template selection, and output parsing, allowing agents to invoke vulnerability scanning without understanding Nuclei's CLI flags or template syntax. Maintains Nuclei's full template library compatibility while exposing results as structured JSON.
Provides template-driven scanning through a standardized interface, whereas direct Nuclei CLI usage requires agents to understand template syntax and manage template repository updates independently.
parameter discovery and fuzzing via arjun
Medium confidenceIntegrates Arjun's parameter discovery capabilities through MCP, enabling agents to identify hidden HTTP parameters through intelligent fuzzing. Arjun uses a curated parameter wordlist and smart matching to discover parameters that are processed by the application but not documented. The MCP wrapper handles parameter fuzzing, response analysis, and result parsing, allowing agents to discover injection points without manual parameter enumeration.
Provides intelligent parameter discovery through MCP by wrapping Arjun's smart fuzzing engine that analyzes responses to identify processed parameters. Handles response analysis and parameter validation, enabling agents to discover injection points without understanding parameter processing logic.
Offers intelligent parameter discovery with response analysis, whereas generic fuzzing tools require manual validation to determine if discovered parameters are actually processed.
dns record generation and mutation via alterx
Medium confidenceExposes Alterx's DNS record generation and mutation capabilities through MCP, enabling agents to generate subdomain variations and mutations for brute-forcing. Alterx creates permutations of domain names using patterns and wordlists, generating candidate subdomains for testing. The MCP wrapper handles pattern configuration and mutation generation, allowing agents to discover subdomains through intelligent brute-forcing without manual pattern creation.
Provides DNS record generation and mutation through MCP by wrapping Alterx's pattern-based subdomain generation engine. Handles pattern configuration and mutation rules, enabling agents to generate intelligent subdomain candidates without understanding pattern syntax.
Offers pattern-based subdomain generation that creates intelligent candidates, whereas generic wordlist-based brute-forcing uses static wordlists and misses pattern-based variations.
sql injection detection and exploitation via sqlmap
Medium confidenceIntegrates SQLmap's automated SQL injection testing engine through MCP, enabling agents to identify and exploit SQL injection vulnerabilities without manual payload crafting. The MCP wrapper handles parameter enumeration, injection point detection, database fingerprinting, and data extraction. SQLmap's extensive payload library and detection heuristics are exposed through simplified MCP parameters (target URL, detection level, risk level), abstracting the complexity of SQL injection testing.
Abstracts SQLmap's complex CLI interface (50+ parameters) into simplified MCP parameters (detection level, risk level, target URL), allowing agents to invoke SQL injection testing without understanding SQLmap's payload mechanics or database fingerprinting logic. Handles output parsing to convert SQLmap's verbose output into structured vulnerability findings.
Provides automated SQL injection testing through a simplified interface, whereas manual SQLmap usage requires security expertise to configure detection levels, risk parameters, and interpret results correctly.
web content discovery and parameter fuzzing via ffuf
Medium confidenceExposes FFUF's high-speed fuzzing engine through MCP for discovering hidden web directories, files, and parameters. FFUF uses wordlist-based fuzzing with configurable matching strategies (status code, response size, regex patterns) to identify web resources. The MCP wrapper handles wordlist selection, filter configuration, and result parsing, enabling agents to discover attack surface without manual fuzzing configuration. Supports both directory discovery and parameter fuzzing workflows.
Wraps FFUF's fuzzing engine with MCP parameter binding for wordlist selection, matching/filtering strategies, and result parsing. Allows agents to invoke high-speed fuzzing without understanding FFUF's CLI syntax or filter logic. Supports both directory discovery and parameter fuzzing through unified interface.
Provides high-speed fuzzing through a simplified MCP interface, whereas direct FFUF CLI usage requires security expertise to configure matching/filtering strategies and interpret results.
network service discovery and port scanning via nmap
Medium confidenceIntegrates Nmap's comprehensive network scanning capabilities through MCP, enabling agents to discover open ports, identify services, and perform OS fingerprinting. The MCP wrapper handles scan type selection (SYN, UDP, comprehensive), timing profiles, and output parsing. Nmap's extensive service database and version detection are exposed through simplified MCP parameters, allowing agents to perform network reconnaissance without understanding Nmap's complex CLI flags.
Abstracts Nmap's extensive CLI options (100+ flags) into simplified MCP parameters for scan type, timing profile, and port specification. Handles output parsing to convert Nmap's XML/text output into structured JSON with service metadata, enabling agents to invoke network scanning without Nmap expertise.
Provides network scanning through a simplified MCP interface, whereas direct Nmap usage requires security expertise to select appropriate scan types, timing profiles, and interpret complex output formats.
high-speed network scanning via masscan
Medium confidenceExposes Masscan's ultra-fast network scanning capabilities through MCP for rapid port discovery across large networks. Masscan uses custom TCP/IP stack for speed, enabling scanning of entire networks in minutes. The MCP wrapper handles rate limiting, port specification, and output parsing. Unlike Nmap's comprehensive approach, Masscan prioritizes speed for initial reconnaissance, discovering open ports without service version detection.
Provides ultra-fast network scanning through MCP by leveraging Masscan's custom TCP/IP stack, enabling agents to scan large networks in minutes rather than hours. Complements Nmap integration by providing rapid initial reconnaissance before detailed scanning.
Masscan scanning is 10-100x faster than Nmap for initial port discovery, making it ideal for large-scale reconnaissance, whereas Nmap provides comprehensive service detection at the cost of speed.
wordpress-specific vulnerability scanning via wpscan
Medium confidenceIntegrates WPScan's WordPress security scanner through MCP, enabling agents to identify plugin vulnerabilities, theme issues, and WordPress misconfigurations. WPScan maintains a database of known WordPress vulnerabilities and performs enumeration of installed plugins/themes. The MCP wrapper handles vulnerability database updates, enumeration options, and result parsing, allowing agents to assess WordPress security without manual WPScan configuration.
Provides WordPress-specific vulnerability scanning through MCP by wrapping WPScan's enumeration and vulnerability database lookup. Handles plugin/theme version detection and correlates against known vulnerabilities, enabling agents to assess WordPress security without understanding WPScan's Ruby implementation.
Offers WordPress-specific scanning with community-maintained vulnerability database, whereas generic web scanners like Nuclei require custom templates for WordPress-specific checks.
ssl/tls configuration analysis via sslscan
Medium confidenceExposes SSLScan's SSL/TLS security assessment capabilities through MCP, enabling agents to analyze cipher strength, certificate validity, and protocol support. SSLScan performs handshake analysis to identify weak ciphers, deprecated protocols (SSLv3, TLSv1.0), and certificate issues. The MCP wrapper handles scan configuration and output parsing, converting SSLScan's detailed output into structured security findings with remediation guidance.
Provides SSL/TLS security assessment through MCP by wrapping SSLScan's handshake analysis and cipher enumeration. Parses detailed cipher and protocol information into structured findings with security recommendations, enabling agents to assess TLS configuration without cryptography expertise.
Offers detailed SSL/TLS configuration analysis, whereas generic vulnerability scanners like Nuclei provide only basic certificate checks without comprehensive cipher strength assessment.
http security header validation and compliance checking
Medium confidenceImplements HTTP security header analysis through MCP, enabling agents to assess compliance with OWASP security header standards (Content-Security-Policy, X-Frame-Options, Strict-Transport-Security, etc.). The tool analyzes HTTP response headers against security best practices, identifying missing headers and misconfigurations. Results include specific remediation guidance for each missing or misconfigured header.
Provides HTTP security header validation through MCP by analyzing response headers against OWASP standards and security best practices. Generates specific remediation guidance for each missing or misconfigured header, enabling agents to assess web application security posture.
Offers focused HTTP header security assessment with OWASP compliance checking, whereas generic web scanners like Nuclei require custom templates for header validation.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with mcp-for-security, ranked by overlap. Discovered automatically through the match graph.
MCPWatch
** - A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP server implementations.
agent-scan
Security scanner for AI agents, MCP servers and agent skills.
@aikidosec/mcp
Aikido MCP server
agentseal
Security toolkit for AI agents. Scan your machine for dangerous skills and MCP configs, monitor for supply chain attacks, test prompt injection resistance, and audit live MCP servers for tool poisoning.
MCP Hunt
** - Realtime platform for discovering trending MCP servers with momentum tracking, upvoting, and community discussions - like Product Hunt meets Reddit for MCP
@aiclude/mcp-guard
MCP runtime security proxy — intercepts and enforces security policies on MCP tool calls
Best For
- ✓AI security researchers building autonomous penetration testing agents
- ✓DevSecOps teams integrating security scanning into LLM-driven workflows
- ✓Security tool vendors wanting MCP client compatibility without native implementation
- ✓Red teamers conducting stealthy reconnaissance phases
- ✓Bug bounty hunters mapping scope before active testing
- ✓Security researchers analyzing organizational attack surface
- ✓Web penetration testers assessing advanced HTTP vulnerabilities
- ✓Security researchers studying HTTP parser implementations
Known Limitations
- ⚠Abstraction adds latency per tool invocation — MCP serialization/deserialization overhead ~50-200ms depending on output size
- ⚠Tool output parsing relies on regex/text extraction rather than structured APIs — fragile to tool version changes
- ⚠No built-in result caching or deduplication across multiple tool runs — duplicate reconnaissance requests execute independently
- ⚠Security context isolation depends on host OS permissions — MCP server runs with same privileges as parent process
- ⚠Passive enumeration is incomplete — only discovers subdomains that have been indexed/logged publicly, missing internal or recently created assets
- ⚠Certificate transparency logs have ~24-48 hour lag — won't find very recently issued certificates
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: Mar 30, 2026
About
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.
Categories
Alternatives to mcp-for-security
Are you the builder of mcp-for-security?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →