MCP Threat Intel ORKL

MCP Threat Intel ORKL

By fr0gger GitHub

-

threat-intelligence MCP-server
Overview

What is MCP Threat Intel ORKL?

MCP Threat Intel ORKL is a Model Context Protocol (MCP) server designed to interface with the ORKL API, enabling users to retrieve and analyze threat reports, threat actors, and breaches.

How to use MCP Threat Intel ORKL?

To use the MCP Threat Intel ORKL, you need to configure the server by editing or creating a specific configuration file and then run the server to start querying the ORKL API for threat intelligence data.

Key features of MCP Threat Intel ORKL?

  • Fetching the latest threat reports with titles and IDs.
  • Retrieving detailed information about specific threat reports and actors.
  • Accessing a list of known threat actors and sources used in threat intelligence.

Use cases of MCP Threat Intel ORKL?

  1. Security analysts can use it to gather intelligence on recent threats.
  2. Organizations can track known threat actors and their activities.
  3. Researchers can analyze trends in cybersecurity breaches.

FAQ from MCP Threat Intel ORKL?

  • What is the purpose of the MCP Threat Intel ORKL?

It serves as a tool for querying threat intelligence data from the ORKL API.

  • Is there a detailed guide available for installation?

Yes! A full write-up is available on the project's blog.

  • Can I integrate this with other applications?

Yes! It is designed to integrate smoothly with MCP-compatible applications.

Content

ORKL MCP Server

MIT License

A full write-up can be found here: https://blog.securitybreak.io/building-a-threat-intelligence-genai-reporter-with-orkl-and-claude-a0ae2e969693

A Model Context Protocol (MCP) server for querying the ORKL API. This server provides tools for fetching and analyzing threat reports, threat actors, and sources. It integrates smoothly with MCP-compatible applications.


Quick Install

Edit or create the file /Users/user/Library/Application Support/Claude/claude_desktop_config.json

{
  "mcpServers": {
    "orkl": {
      "command": "uv",
      "args": [
      "--directory",
      "/MyMCP/mcptest/orkl",
      "run",
      "orkl"
      ]
    }
  }
}

Tools

Report Tools

Fetch Latest Threat Reports

  • Name: fetch_latest_threat_reports
  • Description: Fetch recent threat reports with their titles and IDs.
  • Parameters: None

Fetch Threat Report Details

  • Name: fetch_threat_report_details
  • Description: Retrieve detailed information for a specific threat report by ID.
  • Parameters:
    • report_id (required): The ID of the threat report.

Threat Actor Tools

Fetch Threat Actors

  • Name: fetch_threat_actors
  • Description: Fetch a list of known threat actors with their IDs and names.
  • Parameters: None

Fetch Threat Actor Details

  • Name: fetch_threat_actor_details
  • Description: Retrieve detailed information for a specific threat actor by ID.
  • Parameters:
    • actor_id (required): The ID of the threat actor.

Source Tools

Fetch Sources

  • Name: fetch_sources
  • Description: Fetch a list of sources used in threat intelligence.
  • Parameters: None

Fetch Source Details

  • Name: fetch_source_details
  • Description: Retrieve detailed metadata for a specific source by ID.
  • Parameters:
    • source_id (required): The ID of the source.
No tools information available.

Mirror of

image-generation mcp-server
View Details

Secure MCP server for analyzing Excel files with oletools

oletools mcp-server
View Details

Mirror of

bigquery mcp-server
View Details

MCPHubs is a website that showcases projects related to Anthropic's Model Context Protocol (MCP)

mcp mcp-server
View Details
Dealx
Dealx by DealExpress

-

dealx mcp-server
View Details

Google Analytics MCP server for accessing analytics data through tools and resources

google-analytics mcp-server
View Details

A Python-based MCP server that lets Claude run boto3 code to query and manage AWS resources. Execute powerful AWS operations directly through Claude with proper sandboxing and containerization. No need for complex setups - just pass your AWS credentials and start interacting with all AWS services.

aws mcp-server
View Details