npx — no separate accounts or licenses required.
hackbrowser-mcp
Browser-based security testing — XSS, CSRF, DOM manipulation, cookie theft. 39 tools.
cloud-audit-mcp
Cloud security audits across AWS, Azure, and GCP with 60+ checks. 38 tools.
github-security-mcp
GitHub security posture — repos, orgs, Actions, secrets, supply chain. 39 tools.
cve-mcp
CVE intelligence from NVD, EPSS, CISA KEV, GitHub Advisory, and OSV. 23 tools.
osint-mcp
OSINT recon via Shodan, VirusTotal, SecurityTrails, Censys, DNS, and WHOIS. 37 tools.
hackbrowser-mcp
39 tools · Browser-based security testing hackbrowser-mcp gives CyberStrike a real browser it can drive programmatically. Agents use it to test client-side vulnerabilities that require JavaScript execution: XSS injection and reflection, CSRF token handling, DOM manipulation, cookie theft, clickjacking, and browser-based authentication flows. Key use cases:- Inject and verify XSS payloads across input fields, URL parameters, and HTTP headers
- Test CSRF protections — verify token validation, SameSite cookie enforcement, and origin checks
- Inspect and steal cookies via DOM access to assess session security
- Manipulate the DOM to bypass client-side access controls
- Test single-page application authentication flows end-to-end
Installation and configuration
Installation and configuration
cyberstrike.json:cyberstrike.json
cloud-audit-mcp
38 tools · Cloud security audits cloud-audit-mcp runs structured security checks against AWS, Azure, and GCP accounts. It implements 60+ checks mapped to CIS Benchmarks and common cloud misconfigurations — IAM policy analysis, public resource exposure, encryption gaps, network security group rules, and logging configuration. Key use cases:- Enumerate overly permissive IAM roles, policies, and trust relationships
- Identify publicly exposed storage buckets, databases, and compute instances
- Check encryption-at-rest and encryption-in-transit across storage and compute services
- Audit network security groups and firewall rules for over-permissive inbound access
- Verify logging, monitoring, and alerting configurations against CIS Benchmarks
Installation and configuration
Installation and configuration
cyberstrike.json:cyberstrike.json
github-security-mcp
39 tools · GitHub security posture github-security-mcp audits GitHub repositories and organizations for security weaknesses. It covers repository settings, organization-level policies, GitHub Actions workflow security, exposed secrets in code and configuration, and software supply chain risks in dependencies and third-party Actions. Key use cases:- Audit branch protection rules, required reviews, and force-push restrictions
- Check organization security policies — SSO enforcement, two-factor requirements, member permissions
- Analyze GitHub Actions workflows for dangerous patterns:
pull_request_target, script injection, and untrusted input handling - Detect secrets committed to repositories across history
- Review third-party Action dependencies for supply chain risk (pinned SHAs vs. mutable tags)
Installation and configuration
Installation and configuration
cyberstrike.json:cyberstrike.json
cve-mcp
23 tools · CVE intelligence cve-mcp aggregates vulnerability data from five authoritative sources: the NIST National Vulnerability Database (NVD), EPSS exploit prediction scores, the CISA Known Exploited Vulnerabilities (KEV) catalog, GitHub Advisory Database, and the Open Source Vulnerability (OSV) database. Agents use it to assess the real-world severity and exploitability of vulnerabilities they discover. Key use cases:- Look up CVE details and CVSS scores from NVD
- Query EPSS scores to assess the probability a CVE will be exploited in the wild
- Check whether a CVE appears in the CISA KEV list, indicating active exploitation
- Search GitHub Advisory for package-level vulnerability data
- Cross-reference OSV data for open-source dependency vulnerabilities
Installation and configuration
Installation and configuration
cyberstrike.json:cyberstrike.json
cve-mcp queries public APIs and does not require API keys for basic usage. Rate limits apply to unauthenticated NVD requests; set
NVD_API_KEY in environment if you need higher throughput.osint-mcp
37 tools · OSINT and reconnaissance osint-mcp connects CyberStrike to 12 external intelligence sources for open-source reconnaissance. It wraps Shodan, VirusTotal, SecurityTrails, Censys, and passive DNS and WHOIS providers — giving agents structured access to internet-wide scan data, domain history, IP reputation, and certificate transparency logs. Key use cases:- Search Shodan for exposed services, banners, and CVEs on target IP ranges
- Query VirusTotal for file, URL, and domain reputation
- Enumerate subdomains and DNS history via SecurityTrails
- Search Censys for certificate and service data across the internet
- Perform passive DNS lookups and WHOIS lookups without touching the target directly
Installation and configuration
Installation and configuration
cyberstrike.json:cyberstrike.json
Using all servers together
You can configure multiple MCP servers in a singlecyberstrike.json. CyberStrike agents will have access to all connected servers simultaneously.
cyberstrike.json
timeout, headers, and OAuth — see the MCP integration guide.