halilkirazkaya/pentester-mcp
Elevate your AI assistants (like Claude & Cursor) into autonomous cybersecurity experts. Pentester-MCP integrates 200+ pentesting tools via the Model Context Protocol (MCP) using a secure Docker sandbox.
Platform-specific configuration:
{
"mcpServers": {
"pentester-mcp": {
"command": "npx",
"args": [
"-y",
"pentester-mcp"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
<h1 align="center">Pentester-MCP</h1>
<p align="center"> <strong>Empower your AI assistants with the ultimate open-source penetration testing arsenal.</strong> </p>
<p align="center"> </p>
---
Pentester-MCP provides Model Context Protocol (MCP) integration for over 200+ of the most popular open-source cybersecurity and penetration testing tools.
By adding Pentester-MCP to an AI assistant (like Claude Desktop, Cursor, or specialized agents), the AI gains the autonomous ability to act as a penetration tester:
nmap scans, analyze open ports, and automatically decide to run ffuf on discovered web servers.sqlmap against parameters it identifies as vulnerable.All 235 Python *_mcp.py tools were generated intelligently from cheat sheets to ensure safe execution (e.g., preventing shell injection, enforcing timeouts, and handling huge terminal outputs).
The tools/ directory includes MCP servers for almost every category:
nmap, masscan, recon-ng, amass, subfinder, nucleisqlmap, commix, ffuf, gobuster, dirsearch, niktoimpacket (full suite), bloodhound, responder, evil-winrmhydra, medusa, john, hashcat, nxc---
Because of the massive amount of tools, installing everything on your host mac
Loading reviews...