mirror of
https://github.com/FuzzingLabs/fuzzforge_ai.git
synced 2026-03-13 19:15:57 +00:00
502 lines
14 KiB
JSON
502 lines
14 KiB
JSON
{
|
|
"servers": [
|
|
{
|
|
"name": "nmap-mcp",
|
|
"description": "Network reconnaissance using Nmap - port scanning, service detection, OS fingerprinting",
|
|
"type": "docker",
|
|
"image": "nmap-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "binwalk-mcp",
|
|
"description": "Firmware extraction and analysis using Binwalk - file signatures, entropy analysis, embedded file extraction",
|
|
"type": "docker",
|
|
"image": "binwalk-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "yara-mcp",
|
|
"description": "Pattern matching and malware classification using YARA rules",
|
|
"type": "docker",
|
|
"image": "yara-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "capa-mcp",
|
|
"description": "Static capability detection using capa - identifies malware capabilities in binaries",
|
|
"type": "docker",
|
|
"image": "capa-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "radare2-mcp",
|
|
"description": "Binary analysis and reverse engineering using radare2",
|
|
"type": "docker",
|
|
"image": "radare2-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "ghidra-mcp",
|
|
"description": "Advanced binary decompilation and reverse engineering using Ghidra",
|
|
"type": "docker",
|
|
"image": "ghcr.io/clearbluejar/pyghidra-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "searchsploit-mcp",
|
|
"description": "CVE and exploit search using SearchSploit / Exploit-DB",
|
|
"type": "docker",
|
|
"image": "searchsploit-mcp:latest",
|
|
"category": "exploitation",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "nuclei-mcp",
|
|
"description": "Vulnerability scanning using Nuclei templates",
|
|
"type": "docker",
|
|
"image": "nuclei-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "trivy-mcp",
|
|
"description": "Container and filesystem vulnerability scanning using Trivy",
|
|
"type": "docker",
|
|
"image": "trivy-mcp:latest",
|
|
"category": "cloud-security",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "gitleaks-mcp",
|
|
"description": "Secret and credential detection in code and firmware using Gitleaks",
|
|
"type": "docker",
|
|
"image": "gitleaks-mcp:latest",
|
|
"category": "secrets",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"~/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true
|
|
},
|
|
{
|
|
"name": "bloodhound-mcp",
|
|
"description": "bloodhound-mcp \u2014 active-directory",
|
|
"type": "docker",
|
|
"image": "bloodhound-mcp:latest",
|
|
"category": "active-directory",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "ida-mcp",
|
|
"description": "ida-mcp \u2014 binary-analysis",
|
|
"type": "docker",
|
|
"image": "ida-mcp:latest",
|
|
"category": "binary-analysis",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "daml-viewer-mcp",
|
|
"description": "daml-viewer-mcp \u2014 blockchain",
|
|
"type": "docker",
|
|
"image": "daml-viewer-mcp:latest",
|
|
"category": "blockchain",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "medusa-mcp",
|
|
"description": "medusa-mcp \u2014 blockchain",
|
|
"type": "docker",
|
|
"image": "medusa-mcp:latest",
|
|
"category": "blockchain",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "solazy-mcp",
|
|
"description": "solazy-mcp \u2014 blockchain",
|
|
"type": "docker",
|
|
"image": "solazy-mcp:latest",
|
|
"category": "blockchain",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "prowler-mcp",
|
|
"description": "prowler-mcp \u2014 cloud-security",
|
|
"type": "docker",
|
|
"image": "prowler-mcp:latest",
|
|
"category": "cloud-security",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "roadrecon-mcp",
|
|
"description": "roadrecon-mcp \u2014 cloud-security",
|
|
"type": "docker",
|
|
"image": "roadrecon-mcp:latest",
|
|
"category": "cloud-security",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "semgrep-mcp",
|
|
"description": "semgrep-mcp \u2014 code-security",
|
|
"type": "docker",
|
|
"image": "semgrep-mcp:latest",
|
|
"category": "code-security",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "boofuzz-mcp",
|
|
"description": "boofuzz-mcp \u2014 fuzzing",
|
|
"type": "docker",
|
|
"image": "boofuzz-mcp:latest",
|
|
"category": "fuzzing",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "dharma-mcp",
|
|
"description": "dharma-mcp \u2014 fuzzing",
|
|
"type": "docker",
|
|
"image": "dharma-mcp:latest",
|
|
"category": "fuzzing",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "dnstwist-mcp",
|
|
"description": "dnstwist-mcp \u2014 osint",
|
|
"type": "docker",
|
|
"image": "dnstwist-mcp:latest",
|
|
"category": "osint",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "maigret-mcp",
|
|
"description": "maigret-mcp \u2014 osint",
|
|
"type": "docker",
|
|
"image": "maigret-mcp:latest",
|
|
"category": "osint",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "hashcat-mcp",
|
|
"description": "hashcat-mcp \u2014 password-cracking",
|
|
"type": "docker",
|
|
"image": "hashcat-mcp:latest",
|
|
"category": "password-cracking",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "externalattacker-mcp",
|
|
"description": "externalattacker-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "externalattacker-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "masscan-mcp",
|
|
"description": "masscan-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "masscan-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "networksdb-mcp",
|
|
"description": "networksdb-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "networksdb-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "pd-tools-mcp",
|
|
"description": "pd-tools-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "pd-tools-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "shodan-mcp",
|
|
"description": "shodan-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "shodan-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "whatweb-mcp",
|
|
"description": "whatweb-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "whatweb-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "zoomeye-mcp",
|
|
"description": "zoomeye-mcp \u2014 reconnaissance",
|
|
"type": "docker",
|
|
"image": "zoomeye-mcp:latest",
|
|
"category": "reconnaissance",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "otx-mcp",
|
|
"description": "otx-mcp \u2014 threat-intel",
|
|
"type": "docker",
|
|
"image": "otx-mcp:latest",
|
|
"category": "threat-intel",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "virustotal-mcp",
|
|
"description": "virustotal-mcp \u2014 threat-intel",
|
|
"type": "docker",
|
|
"image": "virustotal-mcp:latest",
|
|
"category": "threat-intel",
|
|
"capabilities": [],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "burp-mcp",
|
|
"description": "burp-mcp \u2014 web-security",
|
|
"type": "docker",
|
|
"image": "burp-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "ffuf-mcp",
|
|
"description": "ffuf-mcp \u2014 web-security",
|
|
"type": "docker",
|
|
"image": "ffuf-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "nikto-mcp",
|
|
"description": "nikto-mcp \u2014 web-security",
|
|
"type": "docker",
|
|
"image": "nikto-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "sqlmap-mcp",
|
|
"description": "sqlmap-mcp \u2014 web-security",
|
|
"type": "docker",
|
|
"image": "sqlmap-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
},
|
|
{
|
|
"name": "waybackurls-mcp",
|
|
"description": "waybackurls-mcp \u2014 web-security",
|
|
"type": "docker",
|
|
"image": "waybackurls-mcp:latest",
|
|
"category": "web-security",
|
|
"capabilities": [
|
|
"NET_RAW"
|
|
],
|
|
"volumes": [
|
|
"/home/afredefon/FuzzingLabs/FuzzForge/fuzzforge-oss/.fuzzforge/hub/workspace:/data"
|
|
],
|
|
"enabled": true,
|
|
"source_hub": "mcp-security-hub"
|
|
}
|
|
],
|
|
"default_timeout": 300,
|
|
"cache_tools": true
|
|
} |