Confidential guide on numerology and astrology, based of GG33 Public information

Roadrecon_mcp_server
Claude MCP Server para realizar análisis en datos de Roadrecon
3 years
Works with Finder
2
Github Watches
5
Github Forks
30
Github Stars
ROADrecon MCP Server
This MCP (Model Context Protocol) server provides AI assistants like Claude with access to your ROADRecon Azure AD data for security analysis.
The amazing ROADtools suite by dirkjanm can be found here: ROADRecon
Features
- Resources: Access Azure AD data from your ROADRecon instance
- Tools: Run security analysis on the data
- Prompts: Pre-built analysis templates for common security tasks
Prerequisites
- Python 3.8+
- A running ROADRecon instance with the web GUI accessible
- MCP-compatible client (Claude Desktop, etc.)
Installation
- Clone this repository
- Install dependencies:
pip install -r requirements.txt
Usage
Running the server
-
Make sure your ROADRecon GUI is running (default: http://localhost:5000)
-
Run the MCP server:
python roadrecon_mcp_server.py
-
To specify a different ROADRecon URL:
ROADRECON_URL=http://localhost:8080 python roadrecon_mcp_server.py
Connecting with Claude Desktop
- Open Claude Desktop
- Go to Settings → Servers → Add Server
- Select "Add from running server"
- The server should appear in the list - click "Install"
More details on this step can be found here: https://modelcontextprotocol.io/quickstart/server
Using in Claude
Once connected, Claude can:
- Access Azure AD data via resources (e.g.,
roadrecon://users
) - Run security analysis with tools (e.g.,
find_privileged_users
) - Use pre-built prompts for common security tasks
Example Queries
- "Analyze the MFA status of users in this Azure AD tenant"
- "Find all users with privileged roles"
- "Check for applications with secrets or certificates"
- "Analyze the overall security posture of this Azure AD environment"
https://github.com/user-attachments/assets/806e9ccd-d80e-4058-be4f-9d37095f1fd6
Resources Available
-
roadrecon://stats
- Summary statistics -
roadrecon://users
- All users -
roadrecon://users/{id}
- User details -
roadrecon://groups
- All groups -
roadrecon://groups/{id}
- Group details -
roadrecon://applications
- All applications -
roadrecon://applications/{id}
- Application details -
roadrecon://serviceprincipals
- All service principals -
roadrecon://serviceprincipals/{id}
- Service principal details -
roadrecon://devices
- All devices -
roadrecon://mfa
- MFA status for all users -
roadrecon://directoryroles
- All directory roles -
roadrecon://roledefinitions
- All role definitions -
roadrecon://approles
- All app role assignments -
roadrecon://oauth2permissions
- All OAuth2 permission grants -
roadrecon://tenantdetails
- Tenant details
Tools Available
-
find_privileged_users()
- Find users with high-privilege roles -
analyze_mfa_status()
- Analyze MFA deployment across users -
find_applications_with_secrets()
- Find applications with secrets/certificates -
analyze_groups()
- Analyze group types and membership -
identify_stale_accounts()
- Find accounts that haven't logged in or changed password within a specified period -
analyze_pim_implementation()
- Assess Privileged Identity Management implementation -
analyze_service_principal_credentials()
- Find over-permissioned service principals with long-lived credentials -
analyze_legacy_authentication()
- Identify risks from legacy authentication protocols that bypass MFA -
analyze_conditional_access_policies(file_path: str = "")
- Analyze conditional access policies from an HTML file. Looks for the file at "C:\Temp\caps.html" by default, or prompts the user to specify a file path if not found.
Prompts Available
-
analyze_security_posture
- Comprehensive security analysis -
analyze_privileged_access
- Analysis of privileged access model -
investigate_application_risks
- Application security risk assessment -
analyze_identity_security
- Identity security configuration analysis -
analyze_stale_accounts
- Analysis of inactive user accounts -
analyze_privileged_access_management
- PIM implementation assessment -
analyze_service_principal_security
- Service principal credential risk analysis -
analyze_legacy_authentication_risks
- Legacy authentication protocol risk assessment -
analyze_conditional_access
- Analysis of conditional access policies and recommendations -
comprehensive_security_review
- Complete security review of the entire environment
License
MIT
相关推荐
Converts Figma frames into front-end code for various mobile frameworks.
Advanced software engineer GPT that excels through nailing the basics.
Take an adjectivised noun, and create images making it progressively more adjective!
I find academic articles and books for research and literature reviews.
Descubra la colección más completa y actualizada de servidores MCP en el mercado. Este repositorio sirve como un centro centralizado, que ofrece un extenso catálogo de servidores MCP de código abierto y propietarios, completos con características, enlaces de documentación y colaboradores.
Manipulación basada en Micrypthon I2C del expansor GPIO de la serie MCP, derivada de AdaFruit_MCP230xx
Servidor MCP para obtener contenido de la página web con el navegador sin cabeza de dramaturgo.
Espejo dehttps: //github.com/agentience/practices_mcp_server
Un bot de chat de IA para equipos pequeños y medianos, que apoyan modelos como Deepseek, Open AI, Claude y Gemini. 专为中小团队设计的 ai 聊天应用 , 支持 Deepseek 、 Open ai 、 Claude 、 Géminis 等模型。
Espejo de https: //github.com/bitrefill/bitrefill-mcp-server
Un poderoso complemento Neovim para administrar servidores MCP (protocolo de contexto del modelo)
Puente entre los servidores Ollama y MCP, lo que permite a LLM locales utilizar herramientas de protocolo de contexto del modelo
Reviews

user_Ponl4KTz
As a dedicated user of the roadrecon_mcp_server developed by atomicchonk, I can confidently say this application is a game-changer for anyone needing reliable MCP server capabilities. The seamless integration and robust functionality it offers are unparalleled. If you're looking for an efficient and powerful server solution, I highly recommend checking it out at https://github.com/atomicchonk/roadrecon_mcp_server.