
Security Operations Multi-Tool Platform (MCP)
All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI agent, it enables tasks like pentesting, bug bounty hunting, threat hunting, and more.
What is secops-mcp?
secops-mcp is an all-in-one security testing toolbox that integrates popular open-source tools through a single MCP interface, connected to an AI agent for enhanced security tasks.
How to use secops-mcp?
To use secops-mcp, clone the repository, build the Docker image, and integrate it with Claude Desktop for seamless operation.
Key features of secops-mcp?
- Integration of multiple security tools in one interface
- AI agent assistance for security tasks
- Support for various security testing methodologies including pentesting and bug bounty hunting
Use cases of secops-mcp?
- Conducting penetration tests on web applications
- Performing vulnerability assessments using integrated tools
- Engaging in bug bounty hunting with automated tools
FAQ from secops-mcp?
- Is secops-mcp suitable for beginners?
Yes, secops-mcp is designed to be user-friendly and integrates various tools to simplify security testing.
- What tools are included in secops-mcp?
It includes tools like Nuclei, SQLMap, Nmap, and many others for comprehensive security testing.
- Is secops-mcp free to use?
Yes, secops-mcp is open-source and free to use under the MIT License.
Security Operations Multi-Tool Platform (MCP)
A comprehensive security operations platform that integrates multiple security tools into a unified interface. This platform provides a centralized way to run various security scanning and testing tools.
Features
- Unified Interface: Single entry point for multiple security tools
- Docker Support: Easy deployment using Docker
- JSON Output: Consistent JSON output format across all tools
- Error Handling: Robust error handling and reporting
- Extensible: Easy to add new tools and functionality
Included Tools
- Nuclei: Fast and customizable vulnerability scanner
- FFUF: Fast web fuzzer and content discovery tool
- Amass: In-depth attack surface mapping and external asset discovery
- Dirsearch: Web path scanner
- Hashcat: Advanced password recovery
- HTTPX: Fast and multi-purpose HTTP toolkit
- IPInfo: IP address information gathering
- Nmap: Network exploration and security auditing
- SQLMap: Automatic SQL injection and database takeover tool
- Subfinder: Subdomain discovery tool
- TLSX: TLS/SSL scanning and analysis
- WFuzz: Web application fuzzer
- XSStrike: Advanced XSS detection and exploitation
Installation
Using Docker (Recommended)
-
Clone the repository:
git clone https://github.com/yourusername/secops-mcp.git cd secops-mcp
-
Build the Docker image:
docker build -t secops-mcp .
-
Run the container:
docker run -it --rm secops-mcp
Manual Installation
-
Clone the repository:
git clone https://github.com/yourusername/secops-mcp.git cd secops-mcp
-
Create and activate a virtual environment:
python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate
-
Install dependencies:
pip install -r requirements.txt
-
Install required tools:
- Follow the installation instructions for each tool in the
tools/
directory - Ensure all tools are in your system PATH
- Follow the installation instructions for each tool in the
Usage
-
Start the application:
python main.py
-
The application will provide a unified interface for running various security tools.
-
Each tool returns results in a consistent JSON format:
{ "success": boolean, "error": string (if error), "results": object (if success) }
Tool Configuration
Each tool can be configured through its respective wrapper in the tools/
directory. Configuration options include:
- Output formats
- Timeouts
- Verbosity levels
- Custom wordlists
- Tool-specific parameters
Security Considerations
- This tool is for authorized security testing only
- Always obtain proper authorization before scanning systems
- Be mindful of rate limiting and scanning intensity
- Respect robots.txt and terms of service
- Use appropriate wordlists and scanning parameters
Contributing
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
License
This project is licensed under the MIT License - see the LICENSE file for details.
Acknowledgments
- All the security tools and their developers
- The security community for their contributions and support