About
This repository aggregates a wide range of Model Context Protocol (MCP) servers tailored for offensive security tasks, including penetration testing tools, exploitation frameworks, reverse engineering utilities, and network analysis platforms. It serves as a centralized resource for security professionals seeking ready‑to‑use MCP solutions.
Capabilities
Offensive MCP Servers List
The Offensive MCP Servers List is a curated catalog of Model Context Protocol (MCP) servers that expose powerful offensive security tools to AI assistants. It addresses the challenge of integrating traditional penetration‑testing and red‑team utilities—such as Metasploit, Nmap, Burp Suite, and Mythic C2—into AI‑driven workflows. By providing a standardized interface, developers can instruct an assistant to run scans, launch exploits, or analyze network traffic without leaving the conversational environment.
At its core, the server exposes each tool as a set of resources and prompts that the AI can invoke. For example, an assistant can request a “port scan” resource from the Nmap MCP server or trigger a “payload delivery” action via the Mythic MCP. The server translates these high‑level requests into concrete tool commands, captures output, and feeds it back to the assistant in a structured format. This abstraction removes the need for manual command‑line interaction, allowing security analysts to focus on strategy rather than tooling.
Key capabilities include:
- Command execution – Run complex toolchains (e.g., Metasploit exploit modules) with a single prompt.
- Result parsing – Structured JSON outputs that can be fed into downstream logic or visualizations.
- Tool chaining – Combine multiple MCP resources (e.g., Nmap scan → Nessus vulnerability assessment) within a single conversation.
- Custom prompts – Tailor the assistant’s behavior for specific use cases, such as automated red‑team exercises or continuous security testing.
Real‑world scenarios that benefit from this server list are abundant. A penetration tester can ask the assistant to “discover all vulnerable services on target X” and receive a full Nmap report, immediately followed by an automated Metasploit exploitation attempt. In a continuous integration pipeline, CI/CD jobs can trigger the MCP server to perform quick security checks before merging code. Red‑team operations can use Mythic’s MCP integration to orchestrate C2 communications without leaving the chat interface, simplifying coordination across distributed teams.
Integration is straightforward for MCP‑aware clients: the server’s endpoints are discovered via standard MCP discovery mechanisms, and each tool’s API is documented in its respective playbook. Developers can embed these servers into custom assistants, build composite workflows that span scanning, exploitation, and post‑exploitation analysis, or extend the catalog with new tools. The unique advantage of this list is its breadth—spanning network discovery, vulnerability assessment, exploit delivery, command‑and‑control, reverse engineering, and forensics—offering a one‑stop MCP hub for offensive security professionals.
Related Servers
MindsDB MCP Server
Unified AI-driven data query across all sources
Homebrew Legacy Server
Legacy Homebrew repository split into core formulae and package manager
Daytona
Secure, elastic sandbox infrastructure for AI code execution
SafeLine WAF Server
Secure your web apps with a self‑hosted reverse‑proxy firewall
mediar-ai/screenpipe
MCP Server: mediar-ai/screenpipe
Skyvern
MCP Server: Skyvern
Weekly Views
Server Health
Information
Explore More Servers
Linear MCP Server
AI-driven integration with Linear project management
Mcp C
C‑based MCP framework with automatic code generation
Gemini Image Generator MCP Server
Generate stunning AI images from text with Gemini 2.0 Flash
Redis Cloud API MCP Server
Speak naturally to manage Redis Cloud resources
Fess MCP Server
Integrate Fess search into agents via MCP
MCP Manager
Quick GUI to enable or disable MCP servers on your machine