mcp-security-hub
MCP ServerFreeA growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
Capabilities11 decomposed
network-reconnaissance-via-nmap-mcp
Medium confidenceExposes Nmap network scanning capabilities through MCP protocol, allowing AI assistants to execute port scans, service enumeration, and OS detection against target hosts. The implementation wraps Nmap's command-line interface as MCP tools, translating natural language scan requests into structured Nmap arguments (scan types, port ranges, timing templates, output formats) and parsing machine-readable XML output back into assistant-consumable structured data.
Bridges Nmap's native CLI into MCP protocol with bidirectional translation: natural language → Nmap flags and XML output → structured JSON, enabling AI assistants to reason about network topology without manual command construction
Unlike standalone Nmap or REST API wrappers, MCP integration allows Claude and other AI assistants to invoke scans as native tools with full context awareness and multi-step reasoning about results
vulnerability-scanning-with-nuclei-templates
Medium confidenceIntegrates Nuclei vulnerability scanner as an MCP tool, enabling AI assistants to execute templated security checks against web applications and infrastructure. The implementation manages Nuclei's template library, translates high-level vulnerability categories (OWASP Top 10, CVE patterns, misconfiguration checks) into template selectors, executes scans with configurable severity filters, and returns structured vulnerability findings with remediation context.
Abstracts Nuclei's template complexity by mapping natural language vulnerability categories to template selectors, allowing non-security-experts to run targeted scans while maintaining expert-level template coverage and result filtering
Nuclei via MCP enables AI assistants to reason about vulnerability patterns and chain scans across multiple targets with context awareness, versus running Nuclei as a standalone CLI tool with no semantic understanding of results
ai-guided-tool-parameter-optimization
Medium confidenceEnables AI assistants to optimize tool parameters (scan intensity, detection sensitivity, resource allocation) based on target characteristics, time constraints, and risk tolerance. The implementation profiles target properties (network size, application complexity, infrastructure scale), recommends optimal tool parameters, and adjusts parameters dynamically based on intermediate results and feedback.
Enables AI assistants to optimize security tool parameters based on target profiling and constraint analysis, versus manual parameter selection which requires expert knowledge of tool behavior and target characteristics
AI-guided parameter optimization via mcp-security-hub enables adaptive tool configuration based on target context, versus static parameter presets which may be suboptimal for diverse targets
sql-injection-testing-with-sqlmap-automation
Medium confidenceWraps SQLMap's automated SQL injection detection engine as an MCP tool, translating high-level injection testing requests into SQLMap payloads and options. The implementation handles parameter enumeration, injection point detection, database fingerprinting, and data extraction, with result parsing that surfaces discovered vulnerabilities, affected parameters, and exploitation techniques in structured format for AI-driven analysis and remediation planning.
Abstracts SQLMap's complex parameter tuning (risk/level/technique) by mapping AI-driven intent (e.g., 'find SQL injection vulnerabilities with minimal noise') to optimal SQLMap configurations, reducing false positives and improving detection speed
SQLMap via MCP allows AI assistants to orchestrate multi-stage injection testing (detection → fingerprinting → extraction) with context awareness, versus manual SQLMap invocation which requires expert knowledge of payload tuning and result interpretation
password-cracking-with-hashcat-acceleration
Medium confidenceExposes Hashcat GPU-accelerated password cracking as an MCP tool, enabling AI assistants to execute hash cracking attacks with configurable wordlists, rule sets, and attack modes. The implementation handles hash format detection, GPU resource management, wordlist selection/generation, and result parsing that surfaces cracked passwords and attack statistics for security assessment workflows.
Bridges Hashcat's GPU-accelerated cracking with MCP protocol, automating hash format detection and wordlist selection while exposing GPU resource constraints to AI assistants for intelligent attack planning (e.g., 'use GPU for bcrypt, CPU for MD5')
Hashcat via MCP enables AI assistants to orchestrate multi-algorithm cracking campaigns with GPU resource awareness, versus standalone Hashcat which requires manual hash type identification and sequential execution
binary-analysis-with-ghidra-decompilation
Medium confidenceIntegrates Ghidra reverse engineering framework as an MCP tool, enabling AI assistants to perform automated binary analysis including decompilation, function identification, data flow analysis, and symbol recovery. The implementation manages Ghidra's headless mode, translates analysis requests into Ghidra scripts, parses decompiled code and analysis results, and surfaces function signatures, control flow graphs, and vulnerability patterns in structured format.
Automates Ghidra's headless analysis pipeline with AI-driven function targeting and result interpretation, translating decompiled code into structured analysis (function signatures, data flows, vulnerability patterns) that AI assistants can reason about without manual Ghidra GUI interaction
Ghidra via MCP enables AI assistants to orchestrate multi-binary analysis campaigns with automated vulnerability pattern detection, versus standalone Ghidra which requires manual function navigation and expert interpretation of decompiled code
osint-data-aggregation-and-enrichment
Medium confidenceProvides OSINT (Open Source Intelligence) data collection and enrichment capabilities through MCP, aggregating information from public sources (DNS records, WHOIS, certificate transparency, public databases) about targets. The implementation queries multiple OSINT APIs and data sources, deduplicates results, enriches findings with threat intelligence context, and surfaces structured intelligence (domains, IPs, email addresses, historical data) for reconnaissance and threat assessment.
Aggregates multiple OSINT sources (DNS, WHOIS, CT logs, public databases) with deduplication and threat intelligence enrichment, presenting unified structured output that AI assistants can reason about for attack surface mapping without manual source querying
OSINT via MCP enables AI assistants to orchestrate multi-source reconnaissance with threat context enrichment, versus manual OSINT tool usage which requires querying each source separately and manual correlation
mcp-tool-registry-and-schema-binding
Medium confidenceImplements MCP protocol compliance layer that registers all security tools (Nmap, Nuclei, SQLMap, Hashcat, Ghidra, OSINT) as callable MCP resources with standardized schema definitions. The implementation defines tool schemas (input parameters, output types, constraints), handles MCP protocol marshaling/unmarshaling, manages tool lifecycle (initialization, execution, cleanup), and provides error handling with structured failure reporting for AI assistant integration.
Implements MCP protocol compliance as a unified registry layer that standardizes tool exposure across heterogeneous security tools (Nmap, Nuclei, SQLMap, etc.), enabling AI assistants to discover and invoke tools with consistent schema-based interfaces
MCP tool registry via mcp-security-hub provides standardized tool exposure versus custom REST API wrappers, enabling AI assistants to understand tool capabilities declaratively and invoke tools with schema validation
docker-containerized-tool-isolation
Medium confidenceProvides Docker containerization for security tools, isolating each tool's runtime environment to prevent dependency conflicts, resource exhaustion, and security incidents. The implementation manages container lifecycle (creation, execution, cleanup), mounts necessary volumes for input/output, configures resource limits (CPU, memory, network), and handles inter-container communication for tool orchestration.
Wraps heterogeneous security tools (Nmap, Nuclei, SQLMap, Hashcat, Ghidra) in standardized Docker containers with resource isolation and lifecycle management, enabling safe parallel execution and multi-tenant deployment without dependency conflicts
Docker containerization via mcp-security-hub provides strong isolation and scalability versus native tool execution, at the cost of container startup overhead and complexity
multi-tool-orchestration-and-chaining
Medium confidenceEnables AI assistants to orchestrate multi-step security workflows by chaining outputs from one tool as inputs to another (e.g., Nmap → Nuclei → SQLMap). The implementation manages tool execution order, data transformation between tools, error handling and recovery, and context propagation across tool boundaries, allowing complex security assessments to be expressed as high-level workflows.
Enables AI assistants to express complex multi-tool security workflows as high-level intent (e.g., 'run a complete assessment'), with automatic tool sequencing, data transformation, and error handling versus manual tool invocation
Workflow orchestration via mcp-security-hub enables AI-driven multi-stage assessments with automatic tool chaining, versus manual tool invocation which requires expert knowledge of tool sequencing and data transformation
structured-result-parsing-and-normalization
Medium confidenceParses and normalizes output from heterogeneous security tools (Nmap XML, Nuclei JSON, SQLMap results, Ghidra analysis, OSINT data) into unified structured formats (JSON, SARIF) for consistent consumption by AI assistants. The implementation handles tool-specific output formats, extracts relevant fields, deduplicates findings, and enriches results with context (severity, affected components, remediation guidance).
Abstracts tool-specific output parsing with unified normalization layer that converts heterogeneous formats (Nmap XML, Nuclei JSON, SQLMap text) into consistent JSON schema with deduplication and threat intelligence enrichment
Structured result parsing via mcp-security-hub enables AI assistants to reason about findings from multiple tools with consistent schema, versus manual parsing which requires tool-specific knowledge and error-prone format conversion
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with mcp-security-hub, ranked by overlap. Discovered automatically through the match graph.
hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capa
hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capa
mcp-for-security
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.
MCPWatch
** - A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP server implementations.
agent-scan
Security scanner for AI agents, MCP servers and agent skills.
OSV
** - Access the [OSV (Open Source Vulnerabilities) database](https://osv.dev/) for vulnerability information. Query vulnerabilities by package version or commit, batch query multiple packages, and get detailed vulnerability information by ID.
Best For
- ✓penetration testers integrating reconnaissance into AI-assisted workflows
- ✓security researchers automating network discovery tasks
- ✓red teams needing rapid network enumeration with AI-driven analysis
- ✓security teams automating vulnerability assessment workflows
- ✓developers integrating security scanning into CI/CD pipelines via AI orchestration
- ✓bug bounty hunters scaling reconnaissance across multiple targets
- ✓security teams automating parameter tuning for diverse targets
- ✓penetration testers optimizing assessment speed without sacrificing coverage
Known Limitations
- ⚠Nmap execution requires root/admin privileges for certain scan types (SYN, OS detection), limiting deployment in restricted environments
- ⚠Large-scale scans (Class B networks) may timeout or consume excessive resources in cloud-hosted MCP deployments
- ⚠Output parsing depends on Nmap version consistency; version mismatches may break structured result extraction
- ⚠Nuclei template accuracy depends on community-maintained templates; false positives increase with permissive severity settings
- ⚠Scanning large target lists sequentially can be slow; parallel execution requires careful rate-limiting to avoid target DoS
- ⚠Template updates require manual refresh or integration with Nuclei's update mechanism; stale templates miss new CVEs
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: Apr 8, 2026
About
A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
Categories
Alternatives to mcp-security-hub
Are you the builder of mcp-security-hub?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →