Sponsored by Deepsite.site

Security Infrastructure Mcp Servers

Created By
jmstar856 months ago
Core Features for Security Infrastructure MCP Servers: * Real-time Security Data Integration - Unified access to Splunk SIEM events, CrowdStrike endpoint detections, and MISP threat intelligence through natural language queries via MCP protocol. * Multi-Platform Query Engine - Execute SPL searches across Splunk indexes, FQL-based detection filtering in CrowdStrike Falcon, and IOC attribute searches in MISP instances with consistent JSON responses. * Automated Threat Correlation - Cross-reference security events between platforms using AI-driven analysis to identify related indicators, detections, and threat intelligence in real-time. * Secure Authentication Framework - Support for multiple authentication methods including OAuth 2.0 (CrowdStrike), API tokens (Splunk), and key-based access (MISP) with automatic session management. * Asynchronous Security Operations - Non-blocking search job management for large-scale security data queries with configurable time ranges and result pagination. * Enterprise Security Workflow - Streamline SOC analyst workflows by enabling natural language security investigations across multiple security platforms through a single MCP interface. This implementation enables security teams to leverage AI assistants for comprehensive threat hunting, incident response, and security analysis across their entire security infrastructure stack.
Content

Security Infrastructure MCP Servers A comprehensive collection of MCP (Model Context Protocol) server implementations for security platform integrations.

🔐 Supported Platforms Splunk SIEM SPL Query Execution: Execute Search Processing Language queries with custom time ranges Event Search: Search security events across all indexes with flexible filtering Time-based Analysis: Support for relative time ranges (-24h, -1d) and custom time windows Asynchronous Job Management: Create and monitor search jobs with automatic result retrieval JSON Result Format: Structured output for seamless integration with other tools CrowdStrike EDR Detection Search: Query detections using FQL (Falcon Query Language) with advanced filtering Detection Details: Retrieve comprehensive detection summaries and metadata OAuth 2.0 Authentication: Secure API access using client credentials flow Sorting and Pagination: Flexible result ordering and limit controls Real-time Threat Data: Access to latest endpoint detection and response information Microsoft MISP Event Search: Query MISP events with customizable filters and event type targeting IOC Attribute Search: Search indicators of compromise by value, type, or category Multi-format Support: Handle various IOC types (IP addresses, domains, hashes, URLs) Published Status Filtering: Filter events by publication status RESTful API Integration: Native MISP REST API support with JSON responses 📖 Live Documentation Complete documentation and code examples: https://jmstar85.github.io/SecurityInfrastructure

Features available in the live documentation:

📋 Complete server implementation code 🔍 Real-time search and filtering 📱 Responsive mobile support 📑 One-click code copying 🗂️ Organized by categories 🚀 Quick Start For MCP Client Integration (Claude Desktop)

1. Clone the repository

git clone https://github.com/jmstar85/SecurityInfrastructure.git cd SecurityInfrastructure

2. Install dependencies

pip install -r project-requirements.txt

3. Configure credentials

cp .env.example .env

Edit .env with your platform credentials

4. Add to Claude Desktop configuration

Copy config/mcp-settings.json content to your Claude Desktop config

Location: ~/Library/Application Support/Claude/claude_desktop_config.json (macOS)

Update the "cwd" paths and environment variables with your values

For Standalone Server Usage

Start individual MCP servers

python src/splunk_server.py # Runs on localhost:8080 python src/crowdstrike_server.py # Runs on localhost:8081 python src/misp_server.py # Runs on localhost:8082

Or use Docker for all services

docker-compose up -d

Run tests to verify connectivity

pytest tests/test_mcp_servers.py -v 🔧 MCP Server Tools Splunk SIEM Tools search-events: Execute SPL queries with time range filtering

Example: Search for failed login attempts in last 24 hours

query = "index=security sourcetype=auth action=failure" earliest_time = "-24h" CrowdStrike EDR Tools search-detections: Query detections using FQL filtering

Example: Search for high severity detections

filter_query = "max_severity:'high'" sort = "created_timestamp.desc" MISP Tools search-events: Query threat intelligence events search-attributes: Search IOCs by type, value, or category

Example: Search for IP-based IOCs

type = "ip-dst" category = "Network activity" 📁 Project Structure SecurityInfrastructure/ ├── docs/ # GitHub Pages documentation │ ├── index.html # Main documentation page │ └── assets/ # CSS, JS resources ├── src/ # MCP server source code │ ├── splunk_server.py # Splunk SIEM integration │ ├── crowdstrike_server.py # CrowdStrike EDR integration │ └── misp_server.py # Microsoft MISP integration ├── config/ # Configuration files │ └── mcp-settings.json # MCP client configuration template ├── tests/ # Unit tests ├── mcp-config.json # Basic MCP configuration ├── .env.example # Environment variables template ├── INSTALLATION.md # Detailed setup guide ├── docker-compose.yml # Container configuration └── project-requirements.txt # Python dependencies 🔧 MCP Client Configuration Claude Desktop Setup Configuration File Location:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json Basic Configuration:

{ "mcpServers": { "security-infrastructure-splunk": { "command": "python", "args": ["/path/to/SecurityInfrastructure/src/splunk_server.py"], "env": { "SPLUNK_HOST": "your-splunk-host.com", "SPLUNK_TOKEN": "your-api-token" } } } } Complete setup instructions: See INSTALLATION.md for detailed configuration guide. Quick setup: See setup-guide.md for copy-paste configuration templates.

💻 Usage Examples Once configured with Claude Desktop, you can use natural language to interact with your security platforms:

Splunk SIEM Queries "Search for failed SSH login attempts in the last 6 hours" "Find all authentication events from IP 192.168.1.100"
"Show me high priority security alerts from yesterday" "Search for events in the security index containing 'malware'" CrowdStrike EDR Queries "Show me all high severity detections from today" "Find endpoint detections with 'ransomware' behavior" "List recent detections sorted by creation time" "Search for detections on hostname 'web-server-01'" MISP Threat Intelligence "Search for events related to APT29" "Find all IP address indicators of compromise" "Look up domain indicators from the last week" "Search for published threat intelligence events about phishing" Cross-Platform Analysis "Search Splunk for events related to this CrowdStrike detection ID" "Check MISP for threat intelligence on this suspicious IP from Splunk" "Correlate this endpoint detection with known threat indicators" 🔧 Configuration Examples Splunk Connection splunk: host: "your-splunk-server.com" port: 8089 username: "admin" token: "your-api-token" verify_ssl: true CrowdStrike Authentication crowdstrike: client_id: "your-client-id" client_secret: "your-client-secret" base_url: "https://api.crowdstrike.com" MISP Setup misp: url: "https://your-misp-instance.com" key: "your-api-key" verifycert: true 🛠️ Key Features Core Functionality MCP Protocol Integration: Native Model Context Protocol server implementation Asynchronous Operations: Non-blocking API calls for optimal performance Multi-platform Support: Unified interface for Splunk, CrowdStrike, and MISP Flexible Query Language: Support for SPL, FQL, and MISP REST queries Security & Authentication Multiple Auth Methods: Session-based, token-based, and OAuth 2.0 authentication SSL/TLS Support: Configurable certificate verification for secure connections API Key Management: Secure credential handling and rotation support Error Recovery: Automatic token refresh and connection retry mechanisms Data Processing Real-time Search: Live querying across security platforms Structured Output: Consistent JSON response format across all integrations Time Range Flexibility: Custom time windows and relative time specifications Result Pagination: Configurable limits and sorting for large datasets Development & Testing Comprehensive Testing: Unit tests with pytest framework Docker Support: Containerized deployment with docker-compose Configuration Management: YAML-based configuration with environment variable support Logging & Monitoring: Structured logging with configurable levels 📋 Requirements Python 3.11+ Access credentials for security platforms (API keys, tokens) MCP-compatible client (Claude Desktop, or other MCP clients) Docker & Docker Compose (optional, for containerized deployment) 🔐 Required Credentials Splunk SIEM API Token (recommended) or Username/Password Host/Port information for your Splunk instance Search permissions on target indexes CrowdStrike EDR Client ID and Client Secret from Falcon Console API permissions: Detections (READ), Hosts (READ), Incidents (READ) Appropriate Base URL for your region Microsoft MISP API Key generated from MISP user profile MISP instance URL Read access to events and attributes 🤝 Contributing Fork the repository Create a feature branch (git checkout -b feature/new-feature) Commit your changes (git commit -am 'Add new feature') Push to the branch (git push origin feature/new-feature) Create a Pull Request 📄 License This project is provided for security research and educational purposes.

🔗 Related Links MCP Protocol Documentation Splunk API Documentation CrowdStrike API Documentation MISP API Documentation ⭐ If you find this useful, please give it a star!

Server Config

{
  "mcpServers": {
    "splunk-siem": {
      "command": "python",
      "args": [
        "/path/to/SecurityInfrastructure/src/splunk_server.py"
      ],
      "env": {
        "SPLUNK_HOST": "your-splunk-host.com",
        "SPLUNK_PORT": "8089",
        "SPLUNK_USERNAME": "admin",
        "SPLUNK_PASSWORD": "your-password",
        "SPLUNK_TOKEN": "your-api-token",
        "SPLUNK_VERIFY_SSL": "true"
      }
    },
    "crowdstrike-edr": {
      "command": "python",
      "args": [
        "/path/to/SecurityInfrastructure/src/crowdstrike_server.py"
      ],
      "env": {
        "CROWDSTRIKE_CLIENT_ID": "your-client-id",
        "CROWDSTRIKE_CLIENT_SECRET": "your-client-secret",
        "CROWDSTRIKE_BASE_URL": "https://api.crowdstrike.com"
      }
    },
    "misp-threat-intel": {
      "command": "python",
      "args": [
        "/path/to/SecurityInfrastructure/src/misp_server.py"
      ],
      "env": {
        "MISP_URL": "https://your-misp-instance.com",
        "MISP_KEY": "your-api-key",
        "MISP_VERIFY_CERT": "true"
      }
    }
  }
}
Recommend Servers
TraeBuild with Free GPT-4.1 & Claude 3.7. Fully MCP-Ready.
EdgeOne Pages MCPAn MCP service designed for deploying HTML content to EdgeOne Pages and obtaining an accessible public URL.
Playwright McpPlaywright MCP server
TimeA Model Context Protocol server that provides time and timezone conversion capabilities. This server enables LLMs to get current time information and perform timezone conversions using IANA timezone names, with automatic system timezone detection.
CursorThe AI Code Editor
Visual Studio Code - Open Source ("Code - OSS")Visual Studio Code
Context7Context7 MCP Server -- Up-to-date code documentation for LLMs and AI code editors
WindsurfThe new purpose-built IDE to harness magic
Jina AI MCP ToolsA Model Context Protocol (MCP) server that integrates with Jina AI Search Foundation APIs.
Serper MCP ServerA Serper MCP Server
Howtocook Mcp基于Anduin2017 / HowToCook (程序员在家做饭指南)的mcp server,帮你推荐菜谱、规划膳食,解决“今天吃什么“的世纪难题; Based on Anduin2017/HowToCook (Programmer's Guide to Cooking at Home), MCP Server helps you recommend recipes, plan meals, and solve the century old problem of "what to eat today"
MiniMax MCPOfficial MiniMax Model Context Protocol (MCP) server that enables interaction with powerful Text to Speech, image generation and video generation APIs.
MCP AdvisorMCP Advisor & Installation - Use the right MCP server for your needs
ChatWiseThe second fastest AI chatbot™
Tavily Mcp
AiimagemultistyleA Model Context Protocol (MCP) server for image generation and manipulation using fal.ai's Stable Diffusion model.
DeepChatYour AI Partner on Desktop
Baidu Map百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Amap Maps高德地图官方 MCP Server
BlenderBlenderMCP connects Blender to Claude AI through the Model Context Protocol (MCP), allowing Claude to directly interact with and control Blender. This integration enables prompt assisted 3D modeling, scene creation, and manipulation.
Zhipu Web SearchZhipu Web Search MCP Server is a search engine specifically designed for large models. It integrates four search engines, allowing users to flexibly compare and switch between them. Building upon the web crawling and ranking capabilities of traditional search engines, it enhances intent recognition capabilities, returning results more suitable for large model processing (such as webpage titles, URLs, summaries, site names, site icons, etc.). This helps AI applications achieve "dynamic knowledge acquisition" and "precise scenario adaptation" capabilities.