{ "servers": [ { "name": "nmap-mcp", "description": "Network reconnaissance using Nmap - port scanning, service detection, OS fingerprinting", "type": "docker", "image": "nmap-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "enabled": true }, { "name": "binwalk-mcp", "description": "Firmware extraction and analysis using Binwalk - file signatures, entropy analysis, embedded file extraction", "type": "docker", "image": "binwalk-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "yara-mcp", "description": "Pattern matching and malware classification using YARA rules", "type": "docker", "image": "yara-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "capa-mcp", "description": "Static capability detection using capa - identifies malware capabilities in binaries", "type": "docker", "image": "capa-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "radare2-mcp", "description": "Binary analysis and reverse engineering using radare2", "type": "docker", "image": "radare2-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "ghidra-mcp", "description": "Advanced binary decompilation and reverse engineering using Ghidra", "type": "docker", "image": "ghcr.io/clearbluejar/pyghidra-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "searchsploit-mcp", "description": "CVE and exploit search using SearchSploit / Exploit-DB", "type": "docker", "image": "searchsploit-mcp:latest", "category": "exploitation", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "nuclei-mcp", "description": "Vulnerability scanning using Nuclei templates", "type": "docker", "image": "nuclei-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "trivy-mcp", "description": "Container and filesystem vulnerability scanning using Trivy", "type": "docker", "image": "trivy-mcp:latest", "category": "cloud-security", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "gitleaks-mcp", "description": "Secret and credential detection in code and firmware using Gitleaks", "type": "docker", "image": "gitleaks-mcp:latest", "category": "secrets", "capabilities": [], "volumes": [ "~/.fuzzforge/hub/workspace:/data" ], "enabled": true }, { "name": "bloodhound-mcp", "description": "bloodhound-mcp \u2014 active-directory", "type": "docker", "image": "bloodhound-mcp:latest", "category": "active-directory", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "ida-mcp", "description": "ida-mcp \u2014 binary-analysis", "type": "docker", "image": "ida-mcp:latest", "category": "binary-analysis", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "daml-viewer-mcp", "description": "daml-viewer-mcp \u2014 blockchain", "type": "docker", "image": "daml-viewer-mcp:latest", "category": "blockchain", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "medusa-mcp", "description": "medusa-mcp \u2014 blockchain", "type": "docker", "image": "medusa-mcp:latest", "category": "blockchain", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "solazy-mcp", "description": "solazy-mcp \u2014 blockchain", "type": "docker", "image": "solazy-mcp:latest", "category": "blockchain", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "prowler-mcp", "description": "prowler-mcp \u2014 cloud-security", "type": "docker", "image": "prowler-mcp:latest", "category": "cloud-security", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "roadrecon-mcp", "description": "roadrecon-mcp \u2014 cloud-security", "type": "docker", "image": "roadrecon-mcp:latest", "category": "cloud-security", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "semgrep-mcp", "description": "semgrep-mcp \u2014 code-security", "type": "docker", "image": "semgrep-mcp:latest", "category": "code-security", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "boofuzz-mcp", "description": "boofuzz-mcp \u2014 fuzzing", "type": "docker", "image": "boofuzz-mcp:latest", "category": "fuzzing", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "dharma-mcp", "description": "dharma-mcp \u2014 fuzzing", "type": "docker", "image": "dharma-mcp:latest", "category": "fuzzing", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "dnstwist-mcp", "description": "dnstwist-mcp \u2014 osint", "type": "docker", "image": "dnstwist-mcp:latest", "category": "osint", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "maigret-mcp", "description": "maigret-mcp \u2014 osint", "type": "docker", "image": "maigret-mcp:latest", "category": "osint", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "hashcat-mcp", "description": "hashcat-mcp \u2014 password-cracking", "type": "docker", "image": "hashcat-mcp:latest", "category": "password-cracking", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "externalattacker-mcp", "description": "externalattacker-mcp \u2014 reconnaissance", "type": "docker", "image": "externalattacker-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "masscan-mcp", "description": "masscan-mcp \u2014 reconnaissance", "type": "docker", "image": "masscan-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "networksdb-mcp", "description": "networksdb-mcp \u2014 reconnaissance", "type": "docker", "image": "networksdb-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "pd-tools-mcp", "description": "pd-tools-mcp \u2014 reconnaissance", "type": "docker", "image": "pd-tools-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "shodan-mcp", "description": "shodan-mcp \u2014 reconnaissance", "type": "docker", "image": "shodan-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "whatweb-mcp", "description": "whatweb-mcp \u2014 reconnaissance", "type": "docker", "image": "whatweb-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "zoomeye-mcp", "description": "zoomeye-mcp \u2014 reconnaissance", "type": "docker", "image": "zoomeye-mcp:latest", "category": "reconnaissance", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "otx-mcp", "description": "otx-mcp \u2014 threat-intel", "type": "docker", "image": "otx-mcp:latest", "category": "threat-intel", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "virustotal-mcp", "description": "virustotal-mcp \u2014 threat-intel", "type": "docker", "image": "virustotal-mcp:latest", "category": "threat-intel", "capabilities": [], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "burp-mcp", "description": "burp-mcp \u2014 web-security", "type": "docker", "image": "burp-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "ffuf-mcp", "description": "ffuf-mcp \u2014 web-security", "type": "docker", "image": "ffuf-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "nikto-mcp", "description": "nikto-mcp \u2014 web-security", "type": "docker", "image": "nikto-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "sqlmap-mcp", "description": "sqlmap-mcp \u2014 web-security", "type": "docker", "image": "sqlmap-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" }, { "name": "waybackurls-mcp", "description": "waybackurls-mcp \u2014 web-security", "type": "docker", "image": "waybackurls-mcp:latest", "category": "web-security", "capabilities": [ "NET_RAW" ], "volumes": [ "/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data" ], "enabled": true, "source_hub": "mcp-security-hub" } ], "default_timeout": 300, "cache_tools": true }