mcp-shodan and mcp-for-security

These are **complements**: the Shodan MCP provides reconnaissance and vulnerability intelligence gathering, while the security testing MCP provides active penetration testing tools (SQLMap, NMAP, Masscan, FFUF), so they work together in a complete security testing workflow where Shodan informs the scope and targets for downstream exploitation tools.

mcp-shodan
64
Established
mcp-for-security
62
Established
Maintenance 10/25
Adoption 10/25
Maturity 25/25
Community 19/25
Maintenance 13/25
Adoption 10/25
Maturity 16/25
Community 23/25
Stars: 115
Forks: 22
Downloads:
Commits (30d): 0
Language: TypeScript
License: MIT
Stars: 559
Forks: 98
Downloads:
Commits (30d): 1
Language: TypeScript
License: MIT
No risk flags
No Package No Dependents

About mcp-shodan

BurtTheCoder/mcp-shodan

MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works with Claude Code, Codex, Gemini CLI, and Claude Desktop.

This tool helps cybersecurity analysts and IT professionals gather intelligence about internet-connected devices, IP addresses, and potential vulnerabilities. You input an IP address, domain name, product name, or a CVE identifier, and it provides structured data on network services, open ports, geographical location, and vulnerability details. It's designed for security researchers, network administrators, and incident response teams.

cybersecurity network-intelligence vulnerability-management threat-intelligence incident-response

About mcp-for-security

cyproxio/mcp-for-security

MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.

This project offers a collection of tools designed for security professionals to automate and integrate security testing into AI-driven workflows. It takes input from various security tools like Nmap, SQLmap, and FFUF, processing network scans, vulnerability assessments, and web content fuzzing. The output provides structured data that can be used by AI systems for advanced threat detection and automated response, benefiting security engineers, penetration testers, and cybersecurity analysts.

penetration-testing vulnerability-management network-security web-application-security mobile-application-security

Scores updated daily from GitHub, PyPI, and npm data. How scores work