Provides support for installing required system tools on Debian-based systems for the local setup option
Provides containerized setup for the penetration testing tools, enabling isolated and consistent deployment of the MCP server and its dependencies
Supports configuration paths and setup instructions specific to Linux systems for Claude Desktop integration
Offers configuration paths and setup instructions specific to macOS systems for Claude Desktop integration
Supports local setup using Python 3.10+ for running the MCP server and its penetration testing tools outside of Docker
Offers installation instructions for system tools required by the penetration testing suite on Ubuntu/Debian-based systems
Pentest Tools MCP Server
An MCP (Model Context Protocol) server for penetration testing tools, designed to work with various LLM clients like Claude Desktop, Roo Code, and other compatible MCP clients.
Features
Comprehensive pentesting tools:
Directory scanning (FFuf, Dirsearch)
Vulnerability scanning (Nuclei, XSStrike)
API testing
Reconnaissance
And more...
Pre-configured wordlists from SecLists
Automated report generation
Claude Desktop integration
Prerequisites
Docker and Docker Compose (for containerized setup)
Claude Desktop application or other MCP-compatible client
Python 3.10+ and uv (for local setup)
Directory Setup
Create the required directories:
Directory structure should look like this:
Setup
Docker Setup (Recommended)
Build and start the container:
Verify the container is running:
Check logs if needed:
Local Setup
Install dependencies:
Install required system tools (example for Ubuntu/Debian):
Claude Desktop Integration
Configure Claude Desktop:
Windows:
MacOS/Linux:
Add server configuration:
For Docker setup:
If the above configuration doesn't work on Windows, try this alternative approach:
Note about cwd
(Current Working Directory):
cwd
tells Claude Desktop which directory to run the command fromIt must be the absolute path to the directory containing
docker-compose.yml
On Windows, use double backslashes (
\\
) in pathsOn Linux/MacOS, use forward slashes (
/
)
Restart Claude Desktop
Usage
Available commands in Claude Desktop:
Reconnaissance:
Directory scanning:
Vulnerability scanning:
API testing:
Natural language commands:
"Run a full security scan on example.com"
"Check for XSS vulnerabilities on example.com"
"Perform reconnaissance on example.com"
Directory Structure Details
Security Notes
Always ensure you have permission to scan targets
Keep tools and dependencies updated
Review scan results carefully
Follow responsible disclosure practices
This server cannot be installed
local-only server
The server can only run on the client's local machine because it depends on local resources.
An MCP server that integrates various penetration testing tools, enabling security professionals to perform reconnaissance, vulnerability scanning, and API testing through natural language commands in compatible LLM clients like Claude Desktop.
Related MCP Servers
- -securityAlicense-qualityAn MCP server that connects any MCP client (like Claude or Cursor) with the browser using browser-use, allowing clients to utilize existing LLMs without requiring additional API keys.Last updated -74Apache 2.0
- -securityFlicense-qualityAn MCP server that allows Claude to interact with local LLMs running in LM Studio, providing access to list models, generate text, and use chat completions through local models.Last updated -10
- AsecurityFlicenseAqualityA specialized MCP server for Claude Desktop that allows executing terminal commands for malware analysis with support for common analysis tools like file, strings, hexdump, objdump, and xxd.Last updated -73
- AsecurityAlicenseAqualityA comprehensive HTTP client MCP server for security testing, API testing, and web automation that provides full-featured HTTP tools with detailed logging capabilities.Last updated -83MIT License