mcp-cyberbro
Using MCP is fun with Cyberbro!
claude mcp add --transport stdio stanfrbd-mcp-cyberbro docker run -i --rm -e CYBERBRO_URL -e API_PREFIX ghcr.io/stanfrbd/mcp-cyberbro:latest \ --env API_PREFIX="api" \ --env CYBERBRO_URL="http://localhost:5000"
How to use
The Cyberbro MCP Server exposes a set of Tools that help you pull IoCs (Indicators of Compromise) from unstructured text, analyze them, and check their reputation across multiple threat intelligence sources. Once deployed, you can interact with the server using MCP clients or OpenAPI proxies to extract domains, IPs, hashes, URLs, and even Chrome extension IDs from input data, run reputation checks, and generate reports. The server integrates with multiple CTI services and reporting capabilities, enabling LLMs to load contextual threat intelligence into the model’s workspace and take informed actions.
In practice, you’ll typically send MCP messages to the server to perform actions such as extracting IoCs from a given text, querying reputation across supported services, and requesting structured results or exportable reports. Tools are designed to be composable: you can first extract IoCs, then filter for high-risk indicators, and finally append CTI reports for enriched context. The server is designed to be Claude-desktop friendly via Docker or local Python invocations and can be used with any MCP client that supports the protocol.
How to install
Prerequisites:
- Docker (optional, for the recommended Docker-based setup) or Python with uv (for local development).
- Git and basic shell access.
- Access to the internet to pull images or install dependencies.
Option 1: Docker (Recommended)
- Install Docker on your machine.
- Run the container with the required environment variable: export CYBERBRO_URL=http://localhost:5000 export API_PREFIX=api docker pull ghcr.io/stanfrbd/mcp-cyberbro:latest docker run -i --rm -e CYBERBRO_URL -e API_PREFIX ghcr.io/stanfrbd/mcp-cyberbro:latest
Option 2: Local Installation (Python/uv)
- Clone the repository: git clone https://github.com/stanfrbd/mcp-cyberbro.git cd mcp-cyberbro
- Install dependencies: uv run pip install -r requirements.txt
- Set up configuration via environment variables or CLI: Option A (env vars): export CYBERBRO_URL=http://localhost:5000 export API_PREFIX=api Option B (CLI args): uv run mcp-cyberbro-server.py --cyberbro_url http://localhost:5000
- Start the server: uv run mcp-cyberbro-server.py The server will listen on stdin/stdout for MCP messages and connect to Cyberbro via CYBERBRO_URL.
Optional environment variables:
- SSL_VERIFY: Set to false to disable SSL verification (useful for self-signed certs).
- API_PREFIX: Custom prefix for the Cyberbro API (e.g., api).
Optional CLI arguments:
- --no_ssl_verify: Disable SSL verification.
- --api_prefix: Set a custom API prefix.
Additional notes
Tips and caveats:
- When using Claude Desktop or other MCP clients, ensure the CYBERBRO_URL environment variable points to your Cyberbro instance and API_PREFIX matches your Cyberbro API path.
- If you’re behind a corporate proxy, configure Docker or uv to allow outbound connections to Cyberbro services.
- For local testing with self-signed certificates, disable SSL verification via SSL_VERIFY=false or --no_ssl_verify.
- OpenAPI proxy setups may require mcpo to be installed (pip install mcpo) to expose the MCP server as an HTTP API endpoint for testing with HTTP clients.
- The server supports multi-service reputation checks; make sure you have API keys or access configured for each CTI provider as needed by your Cyberbro deployment.
Related MCP Servers
mcp -odoo
A Model Context Protocol (MCP) server that enables AI assistants to securely interact with Odoo ERP systems through standardized resources and tools for data retrieval and manipulation.
asterisk
Asterisk Model Context Protocol (MCP) server.
julia
MCP server for persistent Julia sessions — fast iteration without startup/compilation overhead
BinAssistMCP
Binary Ninja plugin to provide MCP functionality.
mcp -docy
A Model Context Protocol server that provides documentation access capabilities. This server enables LLMs to search and retrieve content from documentation websites by scraping them with crawl4ai. Built with FastMCP v2.
mcp-poisoning-poc
This repository demonstrates a variety of **MCP Poisoning Attacks** affecting real-world AI agent workflows.