CTF-MCP is a security tool collection designed for authorized security testing only. This project provides powerful tools that can be dangerous if misused.
CTF-MCP 是一个专为授权安全测试设计的安全工具集。本项目提供的强大工具如果被滥用可能造成危险。
ONLY USE FOR:
- ✅ Authorized penetration testing with written permission
- ✅ CTF (Capture The Flag) competitions
- ✅ Security research in controlled environments
- ✅ Educational purposes in lab environments
- ✅ Testing your own systems
仅用于:
- ✅ 获得书面授权的渗透测试
- ✅ CTF(夺旗赛)竞赛
- ✅ 受控环境中的安全研究
- ✅ 实验环境中的教育目的
- ✅ 测试您自己的系统
NEVER USE FOR:
- ❌ Unauthorized access to systems
- ❌ Malicious attacks
- ❌ Data theft or destruction
- ❌ Denial of Service (DoS) attacks
- ❌ Any illegal activities
禁止用于:
- ❌ 未经授权访问系统
- ❌ 恶意攻击
- ❌ 数据窃取或破坏
- ❌ 拒绝服务(DoS)攻击
- ❌ 任何非法活动
CTF-MCP uses a four-level risk classification system:
- Information gathering tools
- Encoding/decoding utilities
- Basic analysis tools
- No direct security impact
- Vulnerability detection tools
- Network scanning tools
- May trigger security alerts
- Requires authorization
- Exploitation tools
- Credential testing tools
- Can cause system changes
- Requires explicit authorization
- Remote Code Execution (RCE) payloads
- Deserialization exploits
- Command injection payloads
- Can cause severe damage
- Requires written authorization
CTF-MCP has undergone a comprehensive security audit. All dangerous operations are protected with @dangerous_operation decorators that display warnings before execution.
CTF-MCP 已完成全面的安全审计。所有危险操作都使用 @dangerous_operation 装饰器保护,在执行前会显示警告。
- Total Security Decorators: 33
- Modules Audited: 6
- Risk Distribution:
- 🔴 CRITICAL: 14 tools
- 🟠 HIGH: 13 tools
- 🟡 MEDIUM: 6 tools
- 🟢 LOW: All other tools (no decorator needed)
| Module | Total Decorators | CRITICAL | HIGH | MEDIUM |
|---|---|---|---|---|
| pwn.py | 9 | 7 | 2 | 0 |
| web.py | 17 | 5 | 10 | 2 |
| crypto.py | 6 | 0 | 1 | 5 |
| reverse.py | 1 | 0 | 0 | 1 |
| misc.py | 0 | 0 | 0 | 0 |
| forensics.py | 0 | 0 | 0 | 0 |
| Total | 33 | 14 | 13 | 6 |
The following tools are classified as CRITICAL risk and will display security warnings before use:
以下工具被分类为高危风险,使用前会显示安全警告:
shellcode_gen- Generate executable shellcode for various architecturesrop_chain_builder- Build ROP chains for code executionret2libc- ret2libc exploitation techniqueret2csu- ret2csu universal gadget exploitationheap_tcache- Tcache poisoning heap exploitationheap_fastbin- Fastbin dup heap exploitationheap_house_of_force- House of Force heap exploitationheap_house_of_spirit- House of Spirit heap exploitation
ssti_payloads- Server-Side Template Injection (SSTI) payloads for RCEpickle_payload- Python pickle deserialization RCE payloadsphp_unserialize_exploit- PHP unserialize exploits with gadget chainsjava_deserialize- Java deserialization payloads (ysoserial)nodejs_deserialize- Node.js deserialization RCE payloadsyaml_deserialize- YAML deserialization RCE payloadscmd_injection- OS command injection payloadscmd_blind- Blind command injection techniques (time-based, OOB)
The following tools are classified as HIGH risk:
以下工具被分类为高风险:
shellcode_encode- Encode shellcode to avoid detection and bypass filters
sql_payloads- SQL injection payloads for data extraction/modificationlfi_payloads- Local File Inclusion payloads for file read and RCErfi_payloads- Remote File Inclusion payloads for RCEssrf_payloads- Server-Side Request Forgery payloads for internal accessxxe_payloads- XXE injection payloads for file read and SSRFxxe_oob- Out-of-band XXE data exfiltration techniquesxxe_blind- Blind XXE exploitation techniqueshttp_smuggling- HTTP request smuggling for security bypass
hash_crack- Password hash cracking with wordlists
The following tools are classified as MEDIUM risk:
以下工具被分类为中风险:
xss_payloads- Cross-Site Scripting payloads for client-side attacks
xor_single_byte_bruteforce- Brute force single-byte XOR encryptiondes_encrypt- DES encryption (weak algorithm)des_decrypt- DES decryptionrc4- RC4 stream cipher (deprecated algorithm)xor_repeating_key- XOR with repeating key encryption
asm- Generate executable machine code from assembly instructions
✓ Always obtain written authorization before testing
✓ Document the scope of testing
✓ Keep authorization documents accessible
✓ Respect the agreed-upon scope and timeline
✓ Use isolated lab environments for testing
✓ Never test on production systems without approval
✓ Use virtual machines or containers
✓ Implement network segmentation
✓ Handle discovered vulnerabilities responsibly
✓ Protect sensitive data found during testing
✓ Follow responsible disclosure practices
✓ Encrypt test reports and findings
✓ Read tool descriptions before use
✓ Understand the risk level of each tool
✓ Start with LOW risk tools for reconnaissance
✓ Only use CRITICAL tools when necessary
✓ Monitor and log all testing activities
✓ Comply with local laws and regulations
✓ Respect computer fraud and abuse laws
✓ Follow industry standards (OWASP, PTES, etc.)
✓ Maintain professional ethics
Before using CTF-MCP tools, verify:
- I have written authorization to test the target system
- I understand the scope and limitations of testing
- I am using an isolated test environment OR have production approval
- I have reviewed the risk levels of tools I plan to use
- I have a plan for responsible disclosure of findings
- I understand the legal implications in my jurisdiction
- I have proper logging and monitoring in place
- I have a rollback plan if something goes wrong
CTF-MCP includes built-in security features:
All CRITICAL risk tools display warnings before execution:
🔴 CRITICAL RISK - Use with extreme caution
This payload can be dangerous. Only use for:
- Authorized penetration testing
- CTF competitions
- Security research
- Educational purposes
- Path traversal protection
- Command injection prevention
- SQL injection prevention in tool parameters
- File size and type validation
- Automatic timeout for long-running operations
- Prevents resource exhaustion
- Configurable timeout limits
- Tool usage logging (when enabled)
- Timestamp and user tracking
- Command history
If you discover a security vulnerability in CTF-MCP itself:
- DO NOT open a public GitHub issue
- Email the maintainers privately (see README for contact)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you on:
- Confirming the vulnerability
- Developing a fix
- Coordinating disclosure
- Crediting your discovery (if desired)
- Day 0: Report received
- Day 1-2: Initial response and confirmation
- Day 3-14: Fix development and testing
- Day 15-30: Coordinated disclosure
- Day 30+: Public disclosure (if not resolved)
IMPORTANT LEGAL NOTICE:
The developers and contributors of CTF-MCP:
- Provide this tool "AS IS" without warranty
- Are NOT responsible for misuse of these tools
- Do NOT condone illegal activities
- Assume NO liability for damages caused by tool misuse
Users are solely responsible for:
- Obtaining proper authorization
- Complying with applicable laws
- Any consequences of tool usage
- Damages caused by unauthorized testing
By using CTF-MCP, you agree to:
- Use tools only for authorized purposes
- Accept full responsibility for your actions
- Comply with all applicable laws and regulations
- Indemnify the developers from any claims
- OWASP Testing Guide
- PTES - Penetration Testing Execution Standard
- NIST Cybersecurity Framework
- Responsible Disclosure Guidelines
For security-related questions or concerns:
- GitHub Issues (for general questions): CTF-MCP Issues
- Security vulnerabilities: [Contact maintainers privately]
Remember: With great power comes great responsibility. Use CTF-MCP ethically and legally.
记住:能力越大,责任越大。请合法、道德地使用 CTF-MCP。
Last updated: 2026-01-12