mcp-shodan and mcp-security-hub
These are complements: the Shodan server provides reconnaissance data (device discovery, CVE intelligence) that feeds into the security-hub's offensive tools (Nmap, Nuclei, SQLMap) for downstream exploitation and vulnerability assessment.
About mcp-shodan
BurtTheCoder/mcp-shodan
MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works with Claude Code, Codex, Gemini CLI, and Claude Desktop.
This tool helps cybersecurity analysts and IT professionals gather intelligence about internet-connected devices, IP addresses, and potential vulnerabilities. You input an IP address, domain name, product name, or a CVE identifier, and it provides structured data on network services, open ports, geographical location, and vulnerability details. It's designed for security researchers, network administrators, and incident response teams.
About mcp-security-hub
FuzzingLabs/mcp-security-hub
A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
This project provides pre-configured servers that connect popular offensive security tools like Nmap and Ghidra to AI assistants such as Claude. It takes natural language commands as input from your AI assistant, executes the specified security scan or analysis, and returns the results to the assistant. This is designed for cybersecurity professionals, penetration testers, and security researchers looking to leverage AI for automating security assessments and vulnerability discovery.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work