Offensive MCP AI - Red Team Tools for MCP
Project description
Offensive-MCP-AI
🔮 Future Work Using MCP and AI
-
Autonomous Red Team Agents
Build LLM-driven agents that autonomously conduct reconnaissance, payload generation, exploitation and reporting, all orchestrated via MCP tools. -
AI-Powered SOC Analyst
Integrate Wazuh + Suricata + Zeek logs and use MCP to let Claude analyze incidents, detect lateral movement, and recommend response actions in real-time. -
Malware Dev Studio (LLM + MCP)
Use Claude + MCP to automate shellcode generation, obfuscation, sandbox evasion, and EDR bypass strategies through tools like Capstone, Donut, and Sliver. -
Threat Hunting Automation
Develop proactive AI workflows that analyze logs, correlate indicators, and hunt based on threat intelligence feeds via MCPresourcesandtools. -
Agent-Based Purple Team Simulator
Combine MCP with ATT&CK simulations, where Claude orchestrates both Red and Blue side techniques (Atomic Red Team, Caldera, Sigma/YARA rule generation). -
CI/CD + DevSecOps Integration
Use MCP to review code pushed to GitHub, scan secrets, trigger security tools (Trufflehog, Gitleaks), and send secure alerts or PR recommendations. -
Auto Incident Report Generator
Claude consumes logs and tool outputs via MCP and generates full incident reports (including diagrams and mitigations) in Markdown or PDF formats. -
Cybersecurity Tutor / Trainer Mode
Claude explains what each tool does, simulates attacks in safe lab environments, and evaluates user responses via MCP simulation tools.
🔗 Installation & Integration Links
✅ Install MCP CLI and SDK (Python)
pip install modelcontextprotocol
Docs:
🔗 https://modelcontextprotocol.io/quickstart/server
GitHub:
🔗 https://github.com/jlowin/fastmcp
🧠 Claude Desktop Configuration (Mac, Linux, Windows)
-
Install Claude for Desktop
🔗 https://www.anthropic.com/index/claude-desktop -
Edit config file:
macOS/Linux
nano ~/Library/Application\ Support/Claude/claude_desktop_config.json
Windows
notepad %AppData%\Claude\claude_desktop_config.json
- Add your MCP server:
{
"mcpServers": {
"my-wazuh-agent": {
"command": "/full/path/to/python",
"args": [
"mcp_wazuh_server.py"
]
}
}
}
- Restart Claude Desktop — you’ll see the connector icon (⚡) for prompts and the tools icon (🛠) for tool invocation.
🧪 Test Locally with Inspector
Run your server with debugging:
npx @modelcontextprotocol/inspector python mcp_wazuh_server.py
This opens a local UI where you can test @mcp.tool() and @mcp.prompt() before linking with Claude.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file iflow_mcp_cybersecurityup_offensive_mcp_ai-0.1.1.tar.gz.
File metadata
- Download URL: iflow_mcp_cybersecurityup_offensive_mcp_ai-0.1.1.tar.gz
- Upload date:
- Size: 5.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
36b6bd77a72c1f518ac1fb3cda2596b83aff82766c978b4e45783043cf36580e
|
|
| MD5 |
48457e55952b570f0664db0688f7e676
|
|
| BLAKE2b-256 |
722d5d174018db7535cb8199af9d89ed46b70096cfab34c2cd3cf03f8f919a14
|
File details
Details for the file iflow_mcp_cybersecurityup_offensive_mcp_ai-0.1.1-py3-none-any.whl.
File metadata
- Download URL: iflow_mcp_cybersecurityup_offensive_mcp_ai-0.1.1-py3-none-any.whl
- Upload date:
- Size: 7.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
473d85d49f0a14f0f9798e63b310fd83e1b59167b7ee6f17b4d8bd080519c7c3
|
|
| MD5 |
18641913909876bbd49984645686c209
|
|
| BLAKE2b-256 |
66259a8c663a2b4a4ce05b62de420ba9cfa00a7af91c31557923a523d4ab565f
|