RedTeam-Agent: AI-Powered Autonomous Red Team Framework via Model Context Protocol. AI红队与内网渗透自动化框架,支持 gogo, fscan, httpx, nuclei, impacket, playwright 等 15+ 渗透工具,让 LLM 直接化身安全审计黑客。
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"redteam-agent": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
English | 简体中文 | Documentation | Quick Start
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in ai-ml
Workspace template + MCP server for Claude Code, Codex CLI, Cursor & Windsurf. Multi-agent knowledge engine (ag-refresh / ag-ask) that turns any codebase into a queryable AI assistant.
Persistent memory using a knowledge graph
Dynamic problem-solving through sequential thought chains
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
MCP Security Weekly
Get CVE alerts and security updates for RedTeam Agent and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Let AI become your security audit hacker
English | 简体中文 | Documentation | Quick Start
RedTeam-Agent is an AI-powered red team framework using a skill-first terminal workflow. AI reads project skills, discovers tools, executes commands in terminal, and summarizes high-signal findings.
Core philosophy: no manual tool-by-tool operation. Let AI orchestrate the workflow end-to-end.
Python 3.8+
Windows 10/11 or Linux/macOS
8GB+ RAM recommended
git clone https://github.com/ktol1/RedTeam-Agent.git
cd RedTeam-Agent
python -m venv venv
# Windows PowerShell
.\venv\Scripts\Activate.ps1
# Linux/macOS
source venv/bin/activate
# Windows
python scripts/install_tools.py
# Linux/macOS
python scripts/install_tools_linux.py
No extra server setup is required.
cd RedTeam-Agent
dir .\tools
AI will read the repository skill and .github/copilot-instructions.md, then execute terminal commands directly.
First load the redteam skill, then scan 192.168.1.0/24 in terminal,
write output to scan.txt, and summarize high-value findings.
Use SharpHound to collect corp.local data and summarize attack paths.
Set up a chisel proxy and provide upload/run commands.
| # | Tool | Function | Command |
|---|---|---|---|
| 1 | gogo | Fast asset probe | gogo -t 100 -l hosts.txt -q -f gogo.txt |
| 2 | fscan | Network scanner | fscan -h 192.168.1.0/24 -np -silent -nocolor -o fscan.txt |
| 3 | httpx | Web fingerprinting | httpx -l urls.txt -sc -title -server -td -silent -o httpx.txt |
| 4 | nuclei | POC scanner | nuclei -l urls.txt -tags cve,rce -s high,critical -nc -o nuclei.txt |
| 5 | ffuf | Directory fuzzing | ffuf -u http://target/FUZZ -w wordlist.txt -mc 200,301,302 -s -o ffuf.txt |
| 6 | nxc | Lateral movement | nxc smb 192.168.1.0/24 -u user -p pass --shares |
| 7 | kerbrute | Kerberos enum | kerbrute userenum -d corp.local --dc 192.168.1.10 users.txt -o valid_users.txt |
| 8 | SharpHound | Data collection | `SharpHound.exe -c Default -d corp. |