Natural language interface to OpenCTI threat intelligence. Built with Claude Code for $22. Part of Cooper Cyber Coffee.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"opencti-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Connect Claude Desktop to OpenCTI for AI-augmented threat intelligence analysis
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
An evil MCP server used for redteam testing
MCP server for Atomic Red Team
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for Opencti_mcp_server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Connect Claude Desktop to OpenCTI for AI-augmented threat intelligence analysis
🎉 What's New in v0.4.2 Expanded IOC Enrichment: The
search_observabletool now auto-detects and searches 6 observable types - IPv4, IPv6, domains, URLs, emails, and file hashes (MD5, SHA1, SHA256). No more guessing which tool to use! Quick Links | Release Notes
⚡ Getting Started (First Time Users):
🎯 Core Functionality:
🔧 Configuration & Customization:
🔒 Security & Compliance (CRITICAL):
🏢 Enterprise & Air-Gapped Deployment:
📋 Reference & Support:
🎯 By Use Case: