The Pentest MCP server provides a unified natural language interface that integrates key penetration testing tools. Capabilities include:
- Set working mode: Configure for
student
orprofessional
use - Network scanning: Run comprehensive Nmap scans with customizable options (SYN scan, OS detection, NSE scripts)
- Web directory enumeration: Use Gobuster to discover hidden directories with configurable wordlists and authentication
- Web vulnerability scanning: Execute Nikto with tuning options, SSL support, and proxy capabilities
- Password cracking: Utilize John the Ripper with custom wordlists
- Wordlist management: Generate custom wordlists based on patterns, dates, and transformations
- Scan management: Cancel ongoing scans using scan IDs
- Workflow automation: Chain tools together for comprehensive assessments
- Report generation: Create professional client reports with findings and recommendations
Integrated toolkit optimized for Kali Linux that provides penetration testing capabilities including network reconnaissance, web directory enumeration, vulnerability scanning, and password cracking
Requires Node.js v16+ for ESM support to run the penetration testing toolkit server
Enables installation of the penetration testing toolkit via npm package management
Currently this is being very finnicky about PATH issues, I have a working version stable on my end (npm prod version 0.2.7); if you are having any issues, please paste logs into Issues so I can tackle the problem ASAP
Pentest MCP: Professional Penetration Testing Toolkit
Pentest MCP is a Model Context Protocol server that integrates essential pentesting tools into a unified natural language interface. It allows security professionals to execute, chain, and analyze multiple tools through conversational commands.
Comprehensive Toolkit for Professional Pentesters
This toolkit integrates four core penetration testing utilities under a single, intuitive interface:
- Network Reconnaissance with Nmap
- Web Directory Enumeration with Gobuster
- Web Vulnerability Scanning with Nikto
- Password Cracking with John the Ripper
Key Benefits
- Workflow Integration: Chain tools together for comprehensive assessments
- Natural Language Interface: Run complex commands with simple English descriptions
- Automated Reporting: Generate client-ready findings with proper categorization
- Time Efficiency: Execute common pentesting sequences with minimal typing
- Voice Control Compatible: When paired with speech-to-text, allows hands-free operation
- Context Awareness: Tools understand previous scan results and can suggest logical next steps
System Requirements
- Platform: Works on any OS, optimized for Kali Linux
- Tools: Requires Nmap, John the Ripper, Gobuster, and Nikto in your PATH
- Node.js: v16+ (for ESM support)
- MCP Support: A local MCP file server for handling log files (mcp-fileserver or equivalent)
- Permissions: Root/admin for privileged scans (SYN scan, OS detection)
Installation
Installing via Smithery
To install Pentest MCP for Claude Desktop automatically via Smithery:
Manual Installation
MCP Configuration
Add this to your MCP configuration file:
Workflow Examples
Network Discovery & Service Enumeration
Web Application Testing
Multi-Tool Assessment Chain
Custom Password Cracking
Analysis & Reporting
Tool Details
Nmap
The network mapper integration offers full support for:
- Port scanning (TCP SYN, TCP Connect, UDP) with custom port ranges
- Service and version detection with configurable intensity
- OS fingerprinting
- NSE script execution
- Custom timing templates and scan options
Gobuster
Directory and file enumeration for web applications with options for:
- Multiple wordlists and file extension scanning
- Authentication options (basic auth, cookies)
- Customizable threading and status code filtering
- TLS configuration and redirect following
Nikto
Web server vulnerability scanning with support for:
- Comprehensive vulnerability checks
- Authentication and proxy support
- Tunable scan options and timeout configuration
- Finding categorization by vulnerability type
John the Ripper
Password cracking utility with enhanced features:
- Direct hash cracking with wordlists
- Integrated custom wordlist generation
- Pattern-based password creation
- Leetspeak and case variations
Security Notice
AUTHORIZED USE ONLY: This toolkit is for professional penetration testers operating under a valid scope of work. Use only on systems and networks for which you have explicit, written authorization.
OPERATIONAL SECURITY:
- Use VPN for external scanning
- Run in isolated environments
- Monitor scan intensity on sensitive networks
LEGAL COMPLIANCE: Follow all applicable laws and client agreements
Troubleshooting
- Path Issues: Ensure all tools are installed and in your PATH
- Privilege Requirements: SYN scans and OS detection require root/admin
- Permission Errors: Check that the server can write to
scan_logs
andtemp_wordlists
- MCP File Access: Verify that mcp-fileserver (or equivalent) is configured correctly
Contributing
This tool is built for professionals by professionals. Pull requests welcome at the GitHub repository.
You must be authenticated.
local-only server
The server can only run on the client's local machine because it depends on local resources.
A Model Context Protocol server that integrates essential penetration testing tools (Nmap, Gobuster, Nikto, John the Ripper) into a unified natural language interface, allowing security professionals to execute and chain multiple tools through conversational commands.
Related MCP Servers
- AsecurityAlicenseAqualityA Model Context Protocol server providing utility tools for development and testing, offering functionalities like personalized greetings, random card drawing, and datetime formatting with an extensible architecture.Last updated -192152TypeScriptMIT License
- -securityAlicense-qualityA Model Context Protocol server that enables AI assistants to search and retrieve information about security exploits and vulnerabilities from the Exploit Database, enhancing cybersecurity research capabilities.Last updated -4TypeScriptMIT License
- -securityAlicense-qualityA Model Context Protocol server designed for testing backend APIs for security vulnerabilities like authentication bypass, injection attacks, and data leakage.Last updated -5TypeScriptMIT License
- AsecurityAlicenseAqualityA Model Context Protocol server that enables AI-powered analysis of NPM packages through multiple tools for security vulnerability scanning, dependency analysis, package comparison, and quality assessment.Last updated -192152TypeScriptMIT License