MCP Servers Cybersecurity logo

MCP Servers Cybersecurity

by neptune1212

A comprehensive platform for running cybersecurity MCP (Model Context Protocol) servers, designed to integrate and expose various cybersecurity tools and frameworks as modular services. Starting with Nmap and Metasploit, this platform is containerized using Docker for ease of deployment and scalability.

View on GitHub

Last updated: N/A

What is MCP Servers Cybersecurity?

The MCP Servers Cybersecurity platform provides a unified interface for interacting with multiple cybersecurity tools, leveraging the FastMCP framework to expose these tools as modular services, enabling automation, integration, and remote execution of cybersecurity tasks.

How to use MCP Servers Cybersecurity?

To use this server, clone the repository, build and run the platform using Docker Compose, and access the services on their respective ports. New modules can be added by creating a new directory, writing the MCP server script, and updating the Dockerfile and start.sh script.

Key features of MCP Servers Cybersecurity

  • Modular Design

  • API-Driven

  • Scalable Deployment

  • Customizable

Use cases of MCP Servers Cybersecurity

  • Network scanning

  • Vulnerability assessment

  • Penetration testing

  • Security automation

FAQ from MCP Servers Cybersecurity

Services fail to start.

Ensure Docker and Docker Compose are installed and running. Check the logs using: docker-compose logs

Unable to connect to the services.

Verify that the ports 8085 and 8086 are not blocked by a firewall.

How do I add a new tool?

Create a new directory under network/ or a relevant folder. Write the MCP server script for the tool using the FastMCP framework. Update the Dockerfile and start.sh to include the new module. Rebuild the Docker image using: docker-compose up --build

What are the prerequisites for running this server?

Ensure you have Docker and Docker Compose installed.

What tools are currently provided by the Nmap MCP Server?

The Nmap MCP server currently exposes various tools, including Top Ports Scan, DNS Brute Force, List Scan, OS Detection, Version Detection, FIN Scan, Idle Scan, Ping Scan, SYN Scan, TCP Scan, UDP Scan, Port Scan Only, No Port Scan, ARP Discovery, and Disable DNS Resolution.