MCP server + Ollama-driven autonomous penetration testing client. Connects LLMs to security tools (nmap, nikto, sqlmap, dalfox…) via Model Context Protocol with session management, output parsing, and findings persistence.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcpstrike": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP server + Ollama-driven autonomous penetration testing client. Connects LLMs to security tools (nmap, nikto, sqlmap, dalfox…) via Model Context Protocol with session management, output parsing, and findings persistence.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for Mcpstrike and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
mcpstrike connects an LLM (via Ollama) to security tools through the Model Context Protocol (MCP), enabling autonomous or guided penetration testing from a terminal interface.
mcpstrike-client mcpstrike-server (MCP) hexstrike_server
(TUI + Ollama) ---> (FastMCP, port 8889) ---> (port 8888, must be running)
|
v
Ollama LLM
(llama3.2, qwen3.5, etc.)
Optional: mcpstrike-backend can replace hexstrike_server for local testing
Components:
| Component | Role | Default port |
|---|---|---|
| hexstrike_server | External backend — must be started separately | 8888 |
mcpstrike-server | MCP server exposing 15 tools for session/command management | 8889 |
mcpstrike-client | Interactive TUI that drives an Ollama LLM to call MCP tools | — |
mcpstrike-backend (optional) | Lightweight local alternative to hexstrike_server | 8890 |
# Standard install (uses hexstrike-server as backend)
pipx install .
# With optional standalone backend
pipx install ".[backend]"
pip install --user .
# With optional standalone backend
pip install --user ".[backend]"
pip install -e ".[dev,backend]"
hexstrike_server must already be running on port 8888 before starting mcpstrike.
mcpstrike
mcpstrike is the stack launcher. It opens three tiled xterm windows (or falls back to tmux, then background processes). All options can be overridden via flags:
mcpstrike --model qwen3:8b
mcpstrike --ollama-url http://10.0.0.5:11434
mcpstrike --sessions-dir /opt/pentest/sessions
mcpstrike --font-size 15 --screen-width 2560 --screen-height 1440
mcpstrike --tmux # force tmux even if DISPLAY is set
See mcpstrike --help for all options.
Note:
start.sh/my_start.share still available as personal launcher scripts with hardcoded IPs/model names.
# Terminal 1: MCP server (points to hexstrike_server on 8888)
HEXSTRIKE_BACKEND_URL=http://localhost:8888 mcpstrike-server
# Terminal 2: Client
mcpstrike-client --ollama-url http://<ollama-host>:11434 --model qwen3.5
# Terminal 1: Local backend (port 8890, no conflict with hexstrike on 8888)
mcpstrike-backend
# Terminal 2: MCP server pointing to mcpstrike-backend
HEXSTRIKE_BACKEND_URL=http://localhost:8890 mcpstrike-server
# Terminal 3: Client
mcpstrike-client
Requires pipx install ".[backend]".
Starts the full stack in a single command. Automatically picks between xterm, tmux, and background mode.
mcpstrike [OPTIONS]
Network options:
--ollama-url URL Ollama daemon URL (default: http://localhost:11434)
--model NAME Ollama model to use (default: qwen3.5:latest)
--hexstrike-port PORT hexstrike_server port (default: 8888)
--mcp-port PORT mcpstrike-server port (default: 8889)
Session options:
--sessions-dir PATH Directory for session files (default: ~/hexstrike_sessions)
GUI xterm options:
--font-size PT xterm font size in points (default: 13
... [View full README on GitHub](https://github.com/ente0/mcpstrike#readme)