Skip to content

A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.

License

Notifications You must be signed in to change notification settings

atiilla/whiterabbit-mcp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WhiteRabbitMCP — The Model Context Protocol (MCP) Pentesting Toolkit

⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣆⡀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⣿⣦⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⢀⡀⣀⣀⠘⣿⣿⣇⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠹⠿⡿⣿⣿⣷⣾⣿⣿⣿⣦⠀⠀
⠀⠀⠀⠀⠀⢀⣄⣤⣠⣠⣀⣁⣿⣿⣿⣿⣿⣿⣷⠀
⠀⠀⠀⣠⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀
⠀⠀⣰⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃⠀⠀
⠀⠠⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠏⠀⠀⠀
⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠁⠀⠀⠀⠀
⠀⢴⣾⣿⣿⣿⣿⣿⣿⣿⣿⣋⣹⣿⣏⠀⠀⠀⠀⠀
⠀⠈⠛⠛⠋⠙⠛⠛⠛⠛⠛⠛⠛⠙⠛⠃
  WhiteRabbitMCP v1.0⠀
  @atiilla

A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.

Installation

Build te Docker image

git clone https://github.com/atiilla/whiterabbit-mcp.git
cd whiterabbit-mcp
docker build -t whiterabbitmcp .

Usage

Edit your claude_desktop_config.json

{
  "mcpServers": {
    "WhiteRabbitMCP": {
      "command": "docker",
      "args": ["run", "--rm", "-i","--name","whiterabbitmcp", "whiterabbitmcp"]
    }
  }
}

Or Copilot in vscode

mkdir -p .vscode
cd .vscode
touch mcp.json
```json
{
    "servers": {
        "WhiteRabbitMCP": {
            "command": "docker",
            "args": [
                "run",
                "--rm",
                "-i",
                "--net=host",
                "--privileged",
                "--name",
                "whiterabbitmcp",
                "whiterabbitmcp"
            ]
        }
    }
}

You can use the following prompts to test the tools:

Sublist3r
> Use Sublist3rScanner to find all subdomains for example.com and save results to the "recon" folder.
--
DNSRecon
> Run a DNS reconnaissance scan on example.com using DNSReconScanner with standard scan type.
--
Holehe
> Use HoleheScanner to check if the email address [email protected] is registered on various websites.
--
Nmap
> Scan 192.168.1.1 with NmapScanner to check for open ports in the range 1-1000.
--
Ocr2Text
> Use OcrScanner to extract text from the screenshot at /path/to/image.png.
--
Sqlmap 
> Run SqlmapScanner on http://testphp.vulnweb.com/listproducts.php?cat=1 to check for SQL injection vulnerabilities.
--
WPScan
> Use WPScanScanner to scan the WordPress site at https://example.com for vulnerabilities.
--
Zmap
> Scan the subnet 192.168.1.0/24 for systems with port 80 open using ZmapScanner with 1M bandwidth.

Changelog

Implemented Tools

  • Sublist3r - Domain enumeration tool
  • DNSRecon - DNS Reconnaissance tool
  • Holehe - Email registration checker
  • Nmap - Network scanner
  • OCR - Optical Character Recognition
  • Sqlmap - SQL injection scanner
  • WPScan - WordPress security scanner
  • Zmap - Internet scanner
  • Amass - Subdomain enumeration and reconnaissance tool
  • Crt.sh - Subdomain enumeration from SSL certificate logs

Planned Tools

Contributing

If you want to contribute to this project, please follow these steps:

  1. Fork the repository.
  2. Create a new branch (git checkout -b feature-branch).
  3. Make your changes and commit them (git commit -m 'Add some feature').
  4. Push to the branch (git push origin feature-branch).

Disclaimer

This project is for educational purposes only. Use it at your own risk. The author is not responsible for any damages or legal issues that may arise from the use of this software.

  • Version: v1.0
  • License: MIT
  • Author: Built with ❤️ by @atiilla

About

A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.

Topics

Resources

License

Stars

Watchers

Forks