Provides support for installing required system tools on Debian-based systems for the local setup option
Provides containerized setup for the penetration testing tools, enabling isolated and consistent deployment of the MCP server and its dependencies
Supports configuration paths and setup instructions specific to Linux systems for Claude Desktop integration
Offers configuration paths and setup instructions specific to macOS systems for Claude Desktop integration
Supports local setup using Python 3.10+ for running the MCP server and its penetration testing tools outside of Docker
Offers installation instructions for system tools required by the penetration testing suite on Ubuntu/Debian-based systems
Pentest Tools MCP Server
An MCP (Model Context Protocol) server for penetration testing tools, designed to work with various LLM clients like Claude Desktop, Roo Code, and other compatible MCP clients.
Features
- Comprehensive pentesting tools:
- Directory scanning (FFuf, Dirsearch)
- Vulnerability scanning (Nuclei, XSStrike)
- API testing
- Reconnaissance
- And more...
- Pre-configured wordlists from SecLists
- Automated report generation
- Claude Desktop integration
Prerequisites
- Docker and Docker Compose (for containerized setup)
- Claude Desktop application or other MCP-compatible client
- Python 3.10+ and uv (for local setup)
Directory Setup
- Create the required directories:
- Directory structure should look like this:
Setup
Docker Setup (Recommended)
- Build and start the container:
- Verify the container is running:
- Check logs if needed:
Local Setup
- Install dependencies:
- Install required system tools (example for Ubuntu/Debian):
Claude Desktop Integration
- Configure Claude Desktop:
Windows:
MacOS/Linux:
- Add server configuration:
For Docker setup:
If the above configuration doesn't work on Windows, try this alternative approach:
Note about cwd
(Current Working Directory):
cwd
tells Claude Desktop which directory to run the command from- It must be the absolute path to the directory containing
docker-compose.yml
- On Windows, use double backslashes (
\\
) in paths - On Linux/MacOS, use forward slashes (
/
)
- Restart Claude Desktop
Usage
Available commands in Claude Desktop:
- Reconnaissance:
- Directory scanning:
- Vulnerability scanning:
- API testing:
Natural language commands:
- "Run a full security scan on example.com"
- "Check for XSS vulnerabilities on example.com"
- "Perform reconnaissance on example.com"
Directory Structure Details
Security Notes
- Always ensure you have permission to scan targets
- Keep tools and dependencies updated
- Review scan results carefully
- Follow responsible disclosure practices
This server cannot be installed
local-only server
The server can only run on the client's local machine because it depends on local resources.
An MCP server that integrates various penetration testing tools, enabling security professionals to perform reconnaissance, vulnerability scanning, and API testing through natural language commands in compatible LLM clients like Claude Desktop.
Related MCP Servers
- -securityAlicense-qualityAn MCP server that connects any MCP client (like Claude or Cursor) with the browser using browser-use, allowing clients to utilize existing LLMs without requiring additional API keys.Last updated -74PythonApache 2.0
Semgrep MCP Serverofficial
AsecurityAlicenseAqualityAn MCP server that provides a comprehensive interface to Semgrep, enabling users to scan code for security vulnerabilities, create custom rules, and analyze scan results through the Model Context Protocol.Last updated -6372PythonMIT License- -securityFlicense-qualityAn MCP server that allows Claude to interact with local LLMs running in LM Studio, providing access to list models, generate text, and use chat completions through local models.Last updated -8Python
- AsecurityFlicenseAqualityA specialized MCP server for Claude Desktop that allows executing terminal commands for malware analysis with support for common analysis tools like file, strings, hexdump, objdump, and xxd.Last updated -73JavaScript