Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Mcp Pentest

    An MCP server for pentesting. Contributors wanted!

    24 stars
    Python
    Updated Oct 21, 2025

    Table of Contents

    • ⚠️ Work In Progress - Contributors Wanted!
    • 🔍 Overview
    • ✨ Key Features
    • 🏗️ Architecture
    • 🧰 Integrated Tools
    • Network Scanning & Enumeration
    • Web Enumeration
    • Exploitation & Post-Exploitation
    • Password Attacks
    • Privilege Escalation
    • 🚀 Getting Started
    • Prerequisites
    • Installation
    • Testing with Claude Desktop
    • Manual Testing
    • 📋 Project Roadmap
    • 🤝 Contributing
    • How You Can Help
    • Adding New Tool Integrations
    • 💬 Community
    • 📜 License
    • 🔐 Security Considerations
    • 📚 Documentation
    • 🙏 Acknowledgments

    Table of Contents

    • ⚠️ Work In Progress - Contributors Wanted!
    • 🔍 Overview
    • ✨ Key Features
    • 🏗️ Architecture
    • 🧰 Integrated Tools
    • Network Scanning & Enumeration
    • Web Enumeration
    • Exploitation & Post-Exploitation
    • Password Attacks
    • Privilege Escalation
    • 🚀 Getting Started
    • Prerequisites
    • Installation
    • Testing with Claude Desktop
    • Manual Testing
    • 📋 Project Roadmap
    • 🤝 Contributing
    • How You Can Help
    • Adding New Tool Integrations
    • 💬 Community
    • 📜 License
    • 🔐 Security Considerations
    • 📚 Documentation
    • 🙏 Acknowledgments

    Documentation

    MseeP.ai Security Assessment Badge

    Model Context Provider (MCP) for Penetration Testing

    ⚠️ Work In Progress - Contributors Wanted!

    MCP is currently under active development and in alpha stage. We're looking for contributors to help build out this exciting project! Whether you're interested in:

    • Implementing new tool integrations
    • Improving the AI assistant's capabilities
    • Enhancing the UI/UX
    • Writing documentation
    • Testing the system

    Your contributions are welcome! See CONTRIBUTING.md for how to get started.

    🔍 Overview

    The Model Context Provider (MCP) is an open-source framework that bridges AI with penetration testing tools. MCP interfaces with a wide array of pentesting tools, parses and enriches their output in real-time, and strictly follows the standard penetration testing process. It guides human pentesters through each phase – from reconnaissance and scanning to exploitation, post-exploitation, and reporting – aligning with established methodologies.

    ⚠️ Disclaimer: This tool is intended for legal security testing with proper authorization. Misuse of this software for unauthorized access to systems is illegal and unethical.

    ✨ Key Features

    • Methodology Enforcement: Ensures each engagement progresses through proper phases (reconnaissance → scanning → exploitation → post-exploitation → reporting) in order.
    • Real-time Context Aggregation: Captures tool outputs, normalizes the data into a unified engagement context, and stores it for analysis.
    • LLM-Powered Insights: Leverages a large language model to interpret findings and provide guidance during the engagement.
    • Seamless Tool Integration: Acts as a middleware layer that hooks into major pentest tools, converting their results into a common event format.
    • Secure Data Handling: Enforces strict security on processed data, including sanitization when interacting with the LLM.
    • Reporting and Knowledge Retention: Logs all findings and actions in a structured format for report generation.

    🏗️ Architecture

    MCP is built on a microservices-based, event-driven system deployed in a containerized environment:

    • Core Context Processing Engine: Central brain that aggregates and normalizes data from all tools
    • AI-Powered Attack Path Analyzer: Identifies potential attack paths and prioritizes targets
    • Plugin-Based Integration Framework: Extensible system for interfacing with external tools
    • Secure Logging & Reporting Module: Maintains engagement logs and produces reports
    • Real-Time LLM Query Interface: Provides natural language interface for querying findings
    • Role-Based Access Control: Enforces security across all operations

    🧰 Integrated Tools

    MCP currently integrates with the following tools:

    Network Scanning & Enumeration

    • Nmap: Network discovery and security auditing
    • Masscan: High-speed port scanner

    Web Enumeration

    • Gobuster: Directory and file brute forcing
    • Nikto: Web server scanner for vulnerabilities

    Exploitation & Post-Exploitation

    • Metasploit Framework: Exploitation framework

    Password Attacks

    • Hydra: Network login brute-force tool
    • John the Ripper: Offline password cracker

    Privilege Escalation

    • LinPEAS: Linux Privilege Escalation enumeration script

    🚀 Getting Started

    Prerequisites

    • Python 3.8+
    • Nmap (for network scanning)
    • Gobuster (for web enumeration)
    • Proper authorizations and scope definitions for penetration testing

    Installation

    1. Clone this repository:

    bash
    git clone https://github.com/allsmog/mcp-pentest.git
    cd mcp-pentest

    2. Install the MCP server:

    bash
    pip install -e .

    3. Install required dependencies:

    bash
    pip install mcp

    Testing with Claude Desktop

    1. Add this MCP server to your Claude Desktop configuration. Edit your claude_desktop_config.json:

    json
    {
      "mcpServers": {
        "mcp-pentest": {
          "command": "python",
          "args": ["/path/to/mcp-pentest/server.py"],
          "env": {}
        }
      }
    }

    2. Restart Claude Desktop

    3. You should now see the penetration testing tools available in Claude Desktop. Try commands like:

    • "Run an nmap scan on 127.0.0.1"
    • "Perform a gobuster directory scan on https://httpbin.org"
    • "Show me the latest scan events"

    Manual Testing

    You can also test the server directly:

    bash
    # Run the MCP server
    python server.py
    
    # The server will communicate via stdio using the MCP protocol

    See our documentation for complete API references and examples.

    📋 Project Roadmap

    Here's what we're currently working on:

    • [ ] Completing core Context Engine implementation
    • [ ] Finishing initial tool integrations
    • [ ] Building the AI-powered attack path analyzer
    • [ ] Developing the web UI
    • [ ] Creating comprehensive test suite
    • [ ] Adding additional tool integrations
    • [ ] Implementing report generation

    We welcome contributions to any of these areas!

    🤝 Contributing

    Contributions are welcome and appreciated! Please see CONTRIBUTING.md for guidelines.

    How You Can Help

    We're particularly looking for help with:

    1. Tool Integrations: Adding support for more security tools

    2. Testing: Real-world testing and bug reporting

    3. Documentation: Improving and expanding guides

    4. UI Development: Building the web interface

    5. AI Components: Enhancing LLM integration and attack path analysis

    Adding New Tool Integrations

    We especially welcome contributions for new tool integrations. See our Tool Integration Guide for how to add support for additional tools.

    💬 Community

    • Issues: Use GitHub issues for bug reports and feature requests
    • Discussions: GitHub discussions for general questions and ideas

    📜 License

    This project is licensed under the MIT License - see the LICENSE file for details.

    🔐 Security Considerations

    Given the nature of this tool, please be especially mindful of security:

    • Never commit credentials, API keys, or sensitive information
    • Always follow responsible disclosure practices
    • Ensure proper authorization before testing any systems

    📚 Documentation

    • API Reference
    • Architecture Guide
    • Tool Integration Guide
    • Deployment Guide

    🙏 Acknowledgments

    • Thanks to all the open-source penetration testing tools this project builds upon
    • Special recognition to the security researchers and tool developers who inspire this work

    Similar MCP

    Based on tags & features

    • MA

      Mayamcp

      Python·
      27
    • BI

      Biothings Mcp

      Python·
      25
    • GG

      Gget Mcp

      Python·
      17
    • OM

      Omop Mcp

      Python·
      14

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • MA

      Mayamcp

      Python·
      27
    • BI

      Biothings Mcp

      Python·
      25
    • GG

      Gget Mcp

      Python·
      17
    • OM

      Omop Mcp

      Python·
      14

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k