{
"mcpServers": {
"pentest-tools-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Pentest-Tools-MCP-Server
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 350 days ago. 6 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Trust infrastructure for AI agents — DIDs, reputation, verifiable credentials, USDC.
MCP Security Weekly
Get CVE alerts and security updates for Pentest Tools MCP Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
An MCP (Model Context Protocol) server for penetration testing tools, designed to work with various LLM clients like Claude Desktop, Roo Code, and other compatible MCP clients.
# Create directories
mkdir -p reports templates wordlists
pentest-tools/
├── reports/ # For storing scan reports
├── templates/ # For report templates
├── wordlists/ # For custom wordlists
├── pentest-tools-mcp-server.py
├── config.json
├── requirements.txt
├── docker-compose.yml
└── Dockerfile
docker-compose up -d --build
docker-compose ps
docker-compose logs -f
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -r requirements.txt
sudo apt-get install nmap whatweb dnsrecon theharvester ffuf dirsearch sqlmap
Windows:
%APPDATA%\Claude\claude_desktop_config.json
MacOS/Linux:
~/Library/Application Support/Claude/claude_desktop_config.json
For Docker setup:
{
"mcpServers": {
"pentest-tools": {
"command": "docker-compose",
"args": [
"run",
"--rm",
"pentest-tools",
"python3",
"pentest-tools-mcp-server.py"
],
"cwd": "\\Path\\to\\pentest-tools"
}
}
}
If the above configuration doesn't work on Windows, try this alternative approach:
{
"mcpServers": {
"pentest-tools": {
"command": "cmd",
"args": [
"/c",
"cd /d \\path\\to\\pentest-tools && docker-compose run --rm pentest-tools python3 pentest-tools-mcp-server.py"
]
}
}
}
Note about cwd (Current Working Directory):
cwd tells Claude Desktop which directory to run the command fromdocker-compose.yml\\) in paths/)Available commands in Claude Desktop:
/recon example.com
/scan example.com --type directory
/scan example.com --type full
/scan example.com --type xss
/scan example.com --type sqli
/scan example.com --type ssrf
/scan api.example.com --type api
Natural language commands:
pentest-tools/
├── reports/ # Scan reports directory
│ ├── recon/ # Reconnaissance reports
│ ├── vulns/ # Vulnerability scan reports
│ └── api/ # API testing reports
├── templates/ # Report templates
│ ├── recon.html # Template for recon reports
│ ├── vuln.html # Template for vulnerability reports
│ └── api.html # Template for API test reports
├── wordlists/
... [View full README on GitHub](https://github.com/ch1nhpd/Pentest-Tools-MCP-Server#readme)