mirror of
https://github.com/FuzzingLabs/fuzzforge_ai.git
synced 2026-03-13 12:25:54 +00:00
106 lines
3.3 KiB
JSON
106 lines
3.3 KiB
JSON
{
|
|
"servers": [
|
|
{
|
|
"name": "nmap-mcp",
|
|
"description": "Network reconnaissance using Nmap - port scanning, service detection, OS fingerprinting",
|
|
"type": "docker",
|
|
"image": "nmap-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": ["NET_RAW"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "binwalk-mcp",
|
|
"description": "Firmware extraction and analysis using Binwalk - file signatures, entropy analysis, embedded file extraction",
|
|
"type": "docker",
|
|
"image": "binwalk-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "yara-mcp",
|
|
"description": "Pattern matching and malware classification using YARA rules",
|
|
"type": "docker",
|
|
"image": "yara-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "capa-mcp",
|
|
"description": "Static capability detection using capa - identifies malware capabilities in binaries",
|
|
"type": "docker",
|
|
"image": "capa-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "radare2-mcp",
|
|
"description": "Binary analysis and reverse engineering using radare2",
|
|
"type": "docker",
|
|
"image": "radare2-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "ghidra-mcp",
|
|
"description": "Advanced binary decompilation and reverse engineering using Ghidra",
|
|
"type": "docker",
|
|
"image": "ghcr.io/clearbluejar/pyghidra-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "searchsploit-mcp",
|
|
"description": "CVE and exploit search using SearchSploit / Exploit-DB",
|
|
"type": "docker",
|
|
"image": "searchsploit-mcp:latest",
|
|
"category": "exploitation",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "nuclei-mcp",
|
|
"description": "Vulnerability scanning using Nuclei templates",
|
|
"type": "docker",
|
|
"image": "nuclei-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": ["NET_RAW"],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "trivy-mcp",
|
|
"description": "Container and filesystem vulnerability scanning using Trivy",
|
|
"type": "docker",
|
|
"image": "trivy-mcp:latest",
|
|
"category": "cloud-security",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "gitleaks-mcp",
|
|
"description": "Secret and credential detection in code and firmware using Gitleaks",
|
|
"type": "docker",
|
|
"image": "gitleaks-mcp:latest",
|
|
"category": "secrets",
|
|
"capabilities": [],
|
|
"volumes": ["~/.fuzzforge/hub/workspace:/data"],
|
|
"enabled": true
|
|
}
|
|
],
|
|
"default_timeout": 300,
|
|
"cache_tools": true
|
|
}
|