loading…
Search for a command to run...
loading…
Enables AI assistants to interact with the Velociraptor digital forensics and incident response platform for endpoint management and threat hunting. It supports
Enables AI assistants to interact with the Velociraptor digital forensics and incident response platform for endpoint management and threat hunting. It supports artifact collection, VQL query execution, and automated forensic investigation workflows.
A Model Context Protocol (MCP) server that provides AI assistants with access to Velociraptor - the powerful digital forensics and incident response (DFIR) platform.
Megaraptor MCP enables AI assistants like Claude to interact with Velociraptor servers for:
| Category | Tool | Description |
|---|---|---|
| Clients | list_clients |
Search and list Velociraptor endpoints |
get_client_info |
Get detailed information about a client | |
label_client |
Add/remove labels from clients | |
quarantine_client |
Quarantine or release endpoints | |
| Artifacts | list_artifacts |
List available Velociraptor artifacts |
get_artifact |
Get full artifact definition | |
collect_artifact |
Schedule artifact collection on a client | |
| Hunts | create_hunt |
Create a mass collection campaign |
list_hunts |
List existing hunts | |
get_hunt_results |
Retrieve results from a hunt | |
modify_hunt |
Start, pause, stop, or archive hunts | |
| Flows | list_flows |
List collection flows for a client |
get_flow_results |
Get results from a collection | |
get_flow_status |
Check collection status | |
cancel_flow |
Cancel a running collection | |
| VQL | run_vql |
Execute arbitrary VQL queries |
vql_help |
Get help on VQL syntax and plugins |
| Category | Tool | Description |
|---|---|---|
| Server Deployment | deploy_server_binary |
Deploy Velociraptor server as standalone binary |
deploy_server_docker |
Deploy Velociraptor server using Docker | |
deploy_server_cloud |
Deploy Velociraptor server to AWS/Azure cloud | |
generate_server_config |
Generate server configuration with certificates | |
| Agent Deployment | deploy_agent_gpo |
Generate GPO deployment package for Windows |
deploy_agent_winrm |
Deploy agents via WinRM to Windows endpoints | |
deploy_agent_ssh |
Deploy agents via SSH to Linux/macOS endpoints | |
deploy_agent_ansible |
Generate Ansible playbook for agent deployment | |
build_offline_collector |
Build standalone offline collector | |
generate_client_config |
Generate client configuration file | |
| Deployment Management | list_deployments |
List tracked deployment operations |
get_deployment_status |
Get detailed status of a deployment | |
verify_deployment |
Verify deployment health and connectivity | |
rollback_deployment |
Rollback a failed deployment | |
| Credentials | store_credential |
Securely store deployment credentials |
list_credentials |
List stored credential aliases | |
delete_credential |
Remove stored credentials | |
| Utilities | download_velociraptor |
Download Velociraptor binary for platform |
Browse Velociraptor data through standardized URIs:
velociraptor://clients - Browse connected endpointsvelociraptor://clients/{client_id} - View specific client detailsvelociraptor://hunts - Browse hunt campaignsvelociraptor://hunts/{hunt_id} - View specific hunt detailsvelociraptor://artifacts - Browse available artifactsvelociraptor://server-info - View server informationvelociraptor://deployments - Browse deployment operations and statusPre-built DFIR and deployment workflow prompts:
| Prompt | Category | Description |
|---|---|---|
investigate_endpoint |
DFIR | Comprehensive endpoint investigation workflow |
threat_hunt |
DFIR | Create and execute threat hunting campaigns |
triage_incident |
DFIR | Rapid incident triage and scoping |
malware_analysis |
DFIR | Analyze suspicious files or processes |
lateral_movement |
DFIR | Detect lateral movement indicators |
deploy_velociraptor |
Deployment | Interactive Velociraptor deployment wizard |
scale_deployment |
Deployment | Plan enterprise-scale agent rollout |
troubleshoot_deployment |
Deployment | Diagnose and fix deployment issues |
git clone https://github.com/yourusername/megaraptor-mcp.git
cd megaraptor-mcp
# Core DFIR functionality only
pip install -e .
# With deployment features
pip install -e ".[deployment]"
# With cloud deployment (AWS/Azure)
pip install -e ".[cloud]"
# All features
pip install -e ".[all]"
| Extra | Features | Packages |
|---|---|---|
deployment |
Agent/server deployment | paramiko, pywinrm, cryptography, jinja2 |
cloud |
Cloud deployment | boto3, azure-mgmt-compute |
all |
All features | All of the above |
# Core only
pip install mcp pyvelociraptor pyyaml grpcio
# For deployment features
pip install paramiko pywinrm cryptography jinja2
# For cloud deployment
pip install boto3 azure-mgmt-compute azure-identity
Megaraptor MCP supports two authentication methods:
velociraptor --config server.config.yaml config api_client \
--name mcp-client \
--role reader,investigator \
api_client.yaml
export VELOCIRAPTOR_CONFIG_PATH=/path/to/api_client.yaml
Set individual configuration values:
export VELOCIRAPTOR_API_URL=https://velociraptor.example.com:8001
export VELOCIRAPTOR_CLIENT_CERT=/path/to/client.crt # or PEM content
export VELOCIRAPTOR_CLIENT_KEY=/path/to/client.key # or PEM content
export VELOCIRAPTOR_CA_CERT=/path/to/ca.crt # or PEM content
Assign appropriate roles to your API client based on required capabilities:
| Role | Capabilities |
|---|---|
reader |
Read clients, artifacts, hunts, flows |
investigator |
Above + collect artifacts, create hunts |
administrator |
Full access (use with caution) |
# Using the installed command
megaraptor-mcp
# Or as a Python module
python -m megaraptor_mcp
Add to your Claude Desktop configuration (claude_desktop_config.json):
{
"mcpServers": {
"velociraptor": {
"command": "python",
"args": ["-m", "megaraptor_mcp"],
"env": {
"VELOCIRAPTOR_CONFIG_PATH": "/path/to/api_client.yaml"
}
}
}
}
List connected endpoints:
Use the list_clients tool to show all Windows endpoints
Investigate an endpoint:
Use the investigate_endpoint prompt for client C.1234567890abcdef
Create a threat hunt:
Create a hunt for the file hash a1b2c3d4e5f6... across all endpoints
Run custom VQL:
Run this VQL query: SELECT * FROM pslist() WHERE Name =~ 'suspicious'
VQL (Velociraptor Query Language) is the core query language. Common patterns:
-- List all clients
SELECT * FROM clients()
-- Search for clients by hostname
SELECT * FROM clients(search='host:workstation')
-- Get running processes from collected data
SELECT * FROM source(client_id='C.xxx', flow_id='F.xxx')
-- Create a hunt
SELECT hunt(artifacts='Windows.System.Pslist', description='Process audit')
FROM scope()
For complete VQL reference, see: https://docs.velociraptor.app/vql_reference/
Megaraptor MCP includes comprehensive deployment automation for Velociraptor infrastructure.
Deploy Velociraptor servers using multiple methods:
| Method | Use Case | Command |
|---|---|---|
| Binary | On-premise, direct installation | deploy_server_binary |
| Docker | Container environments, quick testing | deploy_server_docker |
| Cloud | AWS/Azure managed deployments | deploy_server_cloud |
Example: Deploy Docker server
Deploy a Velociraptor server using Docker on server.example.com with SSH credentials "prod-server"
Multiple agent deployment methods for different environments:
| Method | Target | Best For |
|---|---|---|
| GPO | Windows (Active Directory) | Enterprise Windows environments |
| WinRM | Windows (remote) | Windows without AD, smaller deployments |
| SSH | Linux/macOS | Unix-like systems |
| Ansible | Multi-platform | Large-scale infrastructure automation |
| Offline Collector | Air-gapped | Isolated networks, forensic collection |
Example: Deploy agents via GPO
Generate a GPO deployment package for 500 Windows endpoints using the enterprise profile
Example: Deploy via Ansible
Create an Ansible playbook to deploy Velociraptor agents to all Linux servers in inventory.yml
Pre-configured deployment profiles for different scenarios:
| Profile | Use Case | Characteristics |
|---|---|---|
| rapid | Quick testing, POC | Minimal config, self-signed certs |
| standard | Production single-site | Proper certificates, standard hardening |
| enterprise | Large-scale multi-site | HA config, advanced monitoring, compliance |
Securely store deployment credentials:
Store SSH credentials for prod-servers with username admin and key file ~/.ssh/prod_key
Credentials are encrypted at rest using AES-256-GCM with a locally-generated key.
Build standalone collectors for air-gapped environments:
Build an offline collector for Windows that collects browser history and network connections
Collectors include embedded configuration and can run without network connectivity.
megaraptor-mcp/
├── pyproject.toml # Project configuration
├── README.md # This file
├── src/
│ └── megaraptor_mcp/
│ ├── __init__.py # Package initialization
│ ├── __main__.py # Module entry point
│ ├── server.py # MCP server main entry
│ ├── client.py # Velociraptor API wrapper
│ ├── config.py # Configuration handling
│ ├── tools/ # MCP tool implementations
│ │ ├── clients.py # Client management tools
│ │ ├── artifacts.py # Artifact tools
│ │ ├── hunts.py # Hunt management tools
│ │ ├── flows.py # Flow/collection tools
│ │ └── vql.py # VQL query tools
│ ├── resources/ # MCP resource implementations
│ │ └── resources.py
│ ├── prompts/ # MCP prompt implementations
│ │ └── prompts.py
│ └── deployment/ # Deployment automation
│ ├── __init__.py # Deployment module init
│ ├── tools.py # Deployment tool implementations
│ ├── server/ # Server deployment
│ │ ├── __init__.py
│ │ ├── binary.py # Binary deployment
│ │ ├── docker.py # Docker deployment
│ │ └── cloud.py # Cloud deployment (AWS/Azure)
│ ├── agent/ # Agent deployment
│ │ ├── __init__.py
│ │ ├── gpo.py # GPO package generation
│ │ ├── winrm.py # WinRM deployment
│ │ ├── ssh.py # SSH deployment
│ │ ├── ansible.py # Ansible playbook generation
│ │ └── offline.py # Offline collector builder
│ ├── credentials.py # Secure credential storage
│ ├── config_generator.py # Config file generation
│ └── profiles.py # Deployment profiles (rapid/standard/enterprise)
└── tests/ # Test suite
├── test_config.py
└── test_deployment.py
.keyfile is generated locally and should be protected..gitignore.pip install -e ".[dev]"
pytest
MIT License - see LICENSE file for details.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"megaraptor-mcp": {
"command": "npx",
"args": []
}
}
}