mcp-velociraptor
mcp-velociraptorは、セキュリティ分析のためのPythonライブラリであり、デジタルフォレンジックや脅威ハンティングに特化しています。ユーザーは、さまざまなデータソースから情報を収集し、分析することで、潜在的な脅威を特定できます。使いやすいインターフェースと豊富な機能を備えており、セキュリティ専門家にとって有用なツールです。
GitHubスター
49
ユーザー評価
未評価
お気に入り
0
閲覧数
25
フォーク
10
イシュー
1
Velociraptor MCP
Velociraptor MCP is a POC Model Context Protocol bridge for exposing LLMs to MCP clients.
Initial version has several Windows orientated triage tools deployed. Best use is querying usecase to target machine name.
e.g
can you give me all network connections on MACHINENAME and look for suspicious processes?
can you tell me which artifacts target the USN journal
Installation
1. Setup an API account
https://docs.velociraptor.app/docs/server_automation/server_api/
Generate an api config file:
velociraptor --config /etc/velociraptor/server.config.yaml config api_client --name api --role administrator,api api_client.yaml
2. Clone mcp-velociraptor repo and test API
- copy api_client.yaml to preferred config location and ensure configuration correct (pointing to appropriate IP address).
- modify test_api.py to appropriate location.
- Run test_api.py to confirm working
- Modify mcp_velociraptor_bridge.py to correct API config
3. Connect to Claude desktop or MCP client of choice
The easiest configuration is to run your venv python directly calling mcp_velociraptor_bridge.
"mcpServers": {
"velociraptor": {
"command": "/path/to/venv/bin/python",
"args": [
"/path/to/mcp_velociraptor_bridge.py"
]
}
}
}
3. Caveats
Due to the nature of DFIR, results depend on amount of data returned, model use and context window.
I have included a function to find artifacts and dynamically create collections but had mixed results.
I have been pleasantly surprised with some results and disappointed when running other collections that cause lots of rows.
Please let me know how you go and feel free to add PR!
can you give me all network connections on MACHINENAME and look for suspicious processes?
can you tell me which artifacts target the USN journal