Skip to main content
Glama

HackerMCP

HackerMCP

HackerMCP is a module built for AI assistants to access and utilize common penetration testing and security tools. This module enables AI systems to leverage powerful security tools through a simple interface.

Currently Supported Tools

  • Nmap: Network discovery and security auditing
  • Metasploit Framework: Penetration testing framework

Future Goals

  • Add support for SQLMap
  • Expand available security tools and capabilities

Installation

Add the following configuration to your MCP configuration file:

{ "mcpServers": { "hackermcp": { "command": "uv", "args": [ "--directory", "~/dir/to/hackermcp", "run", "hacker.py" ] } } }

Replace ~/dir/to/hackermcp with the actual path to the hackermcp directory.

Environment Setup

Prerequisites

  • Python 3.8 or higher
  • Nmap installed on your system
  • Metasploit Framework installed on your system

Virtual Environment Setup

  1. Clone the repository:
    git clone https://github.com/R3verseIN/HackerMCP cd HackerMCP
  2. Set up a virtual environment using uv:
    uv venv source .venv/bin/activate
  3. Install dependencies:
    uv pip install -r requirements.txt

Installing UV

If you don't have the uv package manager then install it:

pip3 install uv

Or use curl to download the installation script:

curl -LsSf https://astral.sh/uv/install.sh | sh

If your system doesn't have curl, you can use wget:

wget -qO- https://astral.sh/uv/install.sh | sh

Disclaimer

This tool is provided for educational and legitimate security testing purposes only.

No warranty is provided with this software. The creator is not responsible for any unethical or illegal use of this tool. Users are solely responsible for ensuring they have proper authorization before conducting any security testing activities.

License

GNU GPL v3 License

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

A module that enables AI assistants to access and utilize common penetration testing and security tools like Nmap and Metasploit through a simple interface.

  1. Currently Supported Tools
    1. Future Goals
      1. Installation
        1. Environment Setup
          1. Prerequisites
          2. Virtual Environment Setup
          3. Installing UV
        2. Disclaimer
          1. License

            Related MCP Servers

            • -
              security
              A
              license
              -
              quality
              Enables AI assistants to perform network scanning operations using NMAP, offering a standardized interface for network analysis and security assessments through AI conversations.
              Last updated -
              671
              25
              JavaScript
              MIT License
            • A
              security
              A
              license
              A
              quality
              A Model Context Protocol server that integrates essential penetration testing tools (Nmap, Gobuster, Nikto, John the Ripper) into a unified natural language interface, allowing security professionals to execute and chain multiple tools through conversational commands.
              Last updated -
              8
              7
              68
              JavaScript
              MIT License
              • Linux
              • Apple
            • -
              security
              A
              license
              -
              quality
              Provides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.
              Last updated -
              69
              Python
              Apache 2.0
              • Linux
              • Apple
            • -
              security
              A
              license
              -
              quality
              A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.
              Last updated -
              8
              Python
              MIT License

            View all related MCP servers

            MCP directory API

            We provide all the information about MCP servers via our MCP API.

            curl -X GET 'https://glama.ai/api/mcp/v1/servers/R3verseIN/HackerMCP'

            If you have feedback or need assistance with the MCP directory API, please join our Discord server