mcp-shodan and mcp-for-security
These are **complements**: the Shodan MCP provides reconnaissance and vulnerability intelligence gathering, while the security testing MCP provides active penetration testing tools (SQLMap, NMAP, Masscan, FFUF), so they work together in a complete security testing workflow where Shodan informs the scope and targets for downstream exploitation tools.
About mcp-shodan
BurtTheCoder/mcp-shodan
MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works with Claude Code, Codex, Gemini CLI, and Claude Desktop.
This tool helps cybersecurity analysts and IT professionals gather intelligence about internet-connected devices, IP addresses, and potential vulnerabilities. You input an IP address, domain name, product name, or a CVE identifier, and it provides structured data on network services, open ports, geographical location, and vulnerability details. It's designed for security researchers, network administrators, and incident response teams.
About mcp-for-security
cyproxio/mcp-for-security
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.
This project offers a collection of tools designed for security professionals to automate and integrate security testing into AI-driven workflows. It takes input from various security tools like Nmap, SQLmap, and FFUF, processing network scans, vulnerability assessments, and web content fuzzing. The output provides structured data that can be used by AI systems for advanced threat detection and automated response, benefiting security engineers, penetration testers, and cybersecurity analysts.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work