Security Toolkit MCP Server
Provides essential security and CTF tools including hash identification, encoding/decoding, XOR bruteforce, JWT decoding, reverse shell generation, SQL injection payloads, CVE lookup, and port service identification for learning security concepts and solving challenges.
README
Security Toolkit MCP Server
A Model Context Protocol (MCP) server providing essential security and CTF tools directly through AI assistants. Perfect for beginners learning Capture The Flag challenges and security testing.
Overview
This MCP server integrates powerful security tools into your AI workflow, making it easier to solve CTF challenges without memorizing complex commands. It's designed for beginners who want to learn security concepts while having helpful tools at their fingertips.
Features
Cryptography & Encoding Tools
- Hash Identification - Identify hash types (MD5, SHA-1, SHA-256, SHA-512, bcrypt, NTLM)
- Multi-format Decoder - Decode Base64, Hex, URL, ROT13, and Binary strings
- XOR Bruteforce - Crack XOR-encrypted data with single or multi-byte keys
- Frequency Analysis - Analyze substitution ciphers using letter frequency
- JWT Decoder - Decode and inspect JSON Web Tokens
Exploitation Tools
- Reverse Shell Generator - Generate payloads for Bash, Python, PHP, Perl, Ruby, and Netcat
- SQL Injection Payloads - Get SQLi payloads (basic, union, blind, error-based, time-based)
Information Gathering
- CVE Lookup - Fetch vulnerability details from the National Vulnerability Database
- Port Service Lookup - Identify common services running on specific ports
Prerequisites
- Python 3.8 or higher
- An MCP-compatible AI client (Claude Desktop, Cline, etc.)
Installation
Step 1: Setup
# Clone or download this repository
cd security-mcp-server
# Install dependencies
pip install mcp requests
Step 2: Configure Your AI Client
For Claude Desktop
Add to your claude_desktop_config.json:
Windows: %APPDATA%\Claude\claude_desktop_config.json
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
{
"mcpServers": {
"security-toolkit": {
"command": "python",
"args": ["/absolute/path/to/server.py"]
}
}
}
For Cline (VS Code Extension)
Add to Cline MCP Settings:
{
"mcpServers": {
"security-toolkit": {
"command": "python",
"args": ["/absolute/path/to/server.py"]
}
}
}
Step 3: Restart Your AI Client
Restart Claude Desktop or reload VS Code to load the MCP server.
Usage Examples
Once configured, you can ask your AI assistant to use these tools naturally:
Hash Identification
"What type of hash is 5d41402abc4b2a76b9719d911017c592?"
Decoding Strings
"Decode this base64: SGVsbG8gV29ybGQh"
"Decode this hex string: 48656c6c6f"
XOR Bruteforce
"Try to decrypt this XOR-encrypted hex: 1c0e1a0a1f"
Frequency Analysis
"Perform frequency analysis on this ciphertext: KHOOR ZRUOG"
JWT Decoding
"Decode this JWT token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
Reverse Shells
"Generate a Python reverse shell for 10.10.14.5 port 4444"
"Give me all reverse shell options for 192.168.1.10:9001"
SQL Injection
"Show me union-based SQL injection payloads"
"What are some time-based blind SQLi payloads?"
CVE Lookup
"Look up CVE-2024-1234"
"What vulnerabilities are associated with CVE-2021-44228?"
Port Identification
"What service typically runs on port 3306?"
"Identify port 5432"
Available Tools Reference
| Tool | Description | CTF Use Cases |
|---|---|---|
hash_identifier |
Identifies hash types | Web challenges, password cracking |
decode_string |
Decodes various formats | Steganography, crypto challenges |
xor_bruteforce |
Cracks XOR encryption | Crypto challenges |
frequency_analysis |
Analyzes cipher patterns | Classical crypto |
jwt_decode |
Decodes JWT tokens | Web exploitation |
reverse_shell_generator |
Creates reverse shells | Post-exploitation, pwn |
sqli_payloads |
SQL injection templates | Web challenges |
cve_lookup |
Fetches CVE details | Real-world vuln research |
port_service_lookup |
Identifies port services | Reconnaissance, enumeration |
Learning Resources for Beginners
Recommended CTF Platforms
- PicoCTF - Beginner-friendly CTF platform with guided challenges
- OverTheWire - Progressive wargames for learning security concepts
- TryHackMe - Guided cybersecurity training with virtual labs
- HackTheBox Academy - Structured learning paths for various security topics
Understanding the Tools
- Hash Identification: Learn about different hash algorithms and their characteristics
- Encoding vs Encryption: Understand the difference (encoding is reversible without a key)
- XOR Cipher: A simple but common encryption method frequently used in CTFs
- SQL Injection: One of the most common web vulnerabilities in real-world applications
Security and Legal Notice
Educational Use Only
This tool is designed for:
- Learning cybersecurity concepts
- Authorized CTF competitions
- Legal penetration testing with explicit permission
- Testing your own systems and networks
Prohibited Uses
Do NOT use this tool for:
- Unauthorized access to systems
- Illegal hacking activities
- Testing systems without explicit permission
- Any malicious purposes
Always obtain proper written authorization before testing any system you don't own.
Troubleshooting
MCP Server Not Loading
- Verify Python is in your system PATH
- Check that the absolute path to
server.pyis correct - Ensure all dependencies are installed:
pip install mcp requests - Review the AI client logs for error messages
- Confirm you're using Python 3.8 or higher
Tool Not Responding
- Restart your AI client after making configuration changes
- Verify the server is listed in your MCP settings
- Check terminal/console output for error messages
- Ensure no firewall is blocking the MCP connection
CVE Lookup Issues
- The National Vulnerability Database API may have rate limits
- Ensure you have an active internet connection
- Verify the CVE ID format follows the pattern: CVE-YYYY-NNNNN
- Some CVEs may not be available if recently published
Technical Details
Dependencies
mcp- Model Context Protocol frameworkrequests- HTTP library for CVE lookups
Architecture
The server uses FastMCP to expose security tools as callable functions through the MCP protocol. Each tool is implemented as a decorated function that returns JSON-formatted results.
Why Use MCP for Security Tools?
The Model Context Protocol integration provides several advantages:
- Context Awareness - AI assistants maintain conversation context across multiple tool uses
- Intelligent Chaining - Tools can be combined automatically (decode, then identify, then crack)
- Natural Language Interface - No need to memorize command syntax or flags
- Educational Explanations - AI can explain results in beginner-friendly terms
- Adaptive Guidance - Suggestions for next steps based on tool outputs
This approach is particularly effective for learning security concepts while building practical skills.
Contributing
Contributions are welcome. When adding new tools or features:
- Maintain clear, beginner-friendly documentation
- Focus on educational value
- Include usage examples
- Add explanations for complex security concepts
- Follow existing code style and patterns
License
This project is provided for educational purposes. Users are responsible for ensuring their use complies with applicable laws and regulations.
Best Practices for CTF Beginners
- Start Simple - Begin with easier CTF challenges and gradually increase difficulty
- Understand, Don't Just Use - Learn why tools work, not just how to use them
- Document Your Process - Keep notes on what worked and what didn't
- Read Write-ups - After solving (or attempting) challenges, read other solutions
- Practice Regularly - Consistent practice is key to improving security skills
- Join Communities - Engage with CTF communities on Discord, Reddit, or forums
- Ask Questions - Use the AI assistant to explain concepts you don't understand
Getting Help
- Ask your AI assistant to use these tools and explain the results in detail
- Request step-by-step explanations of security concepts
- Have the AI suggest alternative approaches when stuck on challenges
- Use the AI to learn the theory behind each tool and technique
Remember: Ethical hacking requires permission. Always operate within legal boundaries and respect system owners' rights.
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。