mcp-for-security and mcp-virustotal

Both tools are Model Context Protocol (MCP) servers, with the first providing a collection of servers for various security tools and the second offering a dedicated MCP server for the VirusTotal API, making them complementary components within the MCP ecosystem for integrating security testing into AI workflows.

mcp-for-security
62
Established
mcp-virustotal
59
Established
Maintenance 13/25
Adoption 10/25
Maturity 16/25
Community 23/25
Maintenance 10/25
Adoption 9/25
Maturity 25/25
Community 15/25
Stars: 559
Forks: 98
Downloads:
Commits (30d): 1
Language: TypeScript
License: MIT
Stars: 113
Forks: 15
Downloads:
Commits (30d): 0
Language: TypeScript
License: MIT
No Package No Dependents
No risk flags

About mcp-for-security

cyproxio/mcp-for-security

MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI workflows.

This project offers a collection of tools designed for security professionals to automate and integrate security testing into AI-driven workflows. It takes input from various security tools like Nmap, SQLmap, and FFUF, processing network scans, vulnerability assessments, and web content fuzzing. The output provides structured data that can be used by AI systems for advanced threat detection and automated response, benefiting security engineers, penetration testers, and cybersecurity analysts.

penetration-testing vulnerability-management network-security web-application-security mobile-application-security

About mcp-virustotal

BurtTheCoder/mcp-virustotal

MCP server for VirusTotal API — analyze URLs, files, IPs, and domains with comprehensive security reports, relationship analysis, and pagination support.

This tool helps cybersecurity professionals and researchers quickly assess potential threats from URLs, files, IP addresses, and domains. It takes an indicator like a URL or file hash and provides comprehensive security reports, including detection results, network connections, and related threats. Security analysts and incident responders can use this to get a full picture of a potential threat.

cybersecurity threat-intelligence incident-response malware-analysis network-security

Scores updated daily from GitHub, PyPI, and npm data. How scores work