A comprehensive security operations platform that integrates multiple security tools into a unified interface. This platform provides a centralized way to run various security scanning and testing tools.
- Unified Interface: Single entry point for multiple security tools
- Docker Support: Easy deployment using Docker
- JSON Output: Consistent JSON output format across all tools
- Error Handling: Robust error handling and reporting
- Extensible: Easy to add new tools and functionality
- Nuclei: Fast and customizable vulnerability scanner
- FFUF: Fast web fuzzer and content discovery tool
- Amass: In-depth attack surface mapping and external asset discovery
- Arjun: HTTP parameter discovery tool for finding hidden parameters
- Dirsearch: Web path scanner
- Gospider: Fast web spider for crawling and URL discovery
- Hashcat: Advanced password recovery
- HTTPX: Fast and multi-purpose HTTP toolkit
- IPInfo: IP address information gathering
- Nmap: Network exploration and security auditing
- SQLMap: Automatic SQL injection and database takeover tool
- Subfinder: Subdomain discovery tool
- TLSX: TLS/SSL scanning and analysis
- WFuzz: Web application fuzzer
- XSStrike: Advanced XSS detection and exploitation
- Nuclei: Vulnerability scanning with custom templates
- FFUF: Fast web fuzzing and content discovery
- WFuzz: Web application fuzzing
- XSStrike: XSS detection and exploitation
- SQLMap: SQL injection testing and exploitation
- Arjun: HTTP parameter discovery and testing
- Gospider: Web crawling and URL discovery
- Dirsearch: Directory and file enumeration
- Nmap: Network scanning and service enumeration
- HTTPX: HTTP probing and analysis
- TLSX: TLS/SSL configuration analysis
- Amass: Attack surface mapping and asset discovery
- Subfinder: Subdomain enumeration
- IPInfo: IP address intelligence gathering
- Hashcat: Password cracking and hash analysis
- Web Crawling: Automated website crawling and URL discovery
- Multiple Output Formats: JSON and text output support
- Filtering Capabilities: Extension-based filtering and content filtering
- Configurable Depth: Customizable crawling depth and concurrency
- Subdomain Support: Option to include subdomains in crawling
- Form Detection: Automatic detection of HTML forms
- Secret Discovery: Identification of potential sensitive information
- Parameter Discovery: Find hidden HTTP parameters in web applications
- Multiple HTTP Methods: Support for GET, POST, PUT, and other methods
- Bulk Scanning: Scan multiple URLs simultaneously
- Custom Wordlists: Use custom parameter wordlists
- Stable Mode: Reduced false positives with stable scanning mode
- Custom Headers: Support for custom HTTP headers and authentication
- Threading Support: Configurable threading for faster scans
-
Clone the repository:
git clone https://github.com/securityfortech/secops-mcp.git cd secops-mcp
-
Build the Docker image:
docker build -t secops-mcp .
-
Run the container:
docker run -it --rm secops-mcp
-
Clone the repository:
git clone https://github.com/securityfortech/secops-mcp.git cd secops-mcp
-
Create and activate a virtual environment:
python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate
-
Install dependencies:
pip install -r requirements.txt
-
Install required tools:
- Follow the installation instructions for each tool in the
tools/
directory - Ensure all tools are in your system PATH
- Follow the installation instructions for each tool in the
-
Start the application:
python main.py
-
The application will provide a unified interface for running various security tools.
-
Each tool returns results in a consistent JSON format:
{ "success": boolean, "error": string (if error), "results": object (if success) }
# Basic web crawling
gospider_scan("https://example.com", depth=3, include_subs=True)
# Filtered crawling for specific file types
gospider_filtered_scan(
"https://example.com",
extensions=["js", "json", "xml"],
exclude_extensions=["png", "jpg", "css"]
)
# Basic parameter discovery
arjun_scan("https://example.com/api", method="GET")
# POST parameter discovery with custom data
arjun_scan(
"https://example.com/login",
method="POST",
data="username=test&password=test",
stable=True
)
# Bulk parameter scanning
arjun_bulk_parameter_scan([
"https://example.com/api/v1",
"https://example.com/api/v2"
])
Each tool can be configured through its respective wrapper in the tools/
directory. Configuration options include:
- Output formats
- Timeouts
- Verbosity levels
- Custom wordlists
- Tool-specific parameters
- This tool is for authorized security testing only
- Always obtain proper authorization before scanning systems
- Be mindful of rate limiting and scanning intensity
- Respect robots.txt and terms of service
- Use appropriate wordlists and scanning parameters
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- All the security tools and their developers
- The security community for their contributions and support