MCP cover image
See in Github
2025-03-05

用于填充的MCP服务器。贡献者想要!

2

Github Watches

0

Github Forks

17

Github Stars

Model Context Provider (MCP) for Penetration Testing

MCP pent docs/images/mcp-logo.png
An AI-driven assistant and middleware for penetration testing engagements

License: MIT Python 3.8+ Docker Status: WIP

⚠️ Work In Progress - Contributors Wanted!

MCP is currently under active development and in alpha stage. We're looking for contributors to help build out this exciting project! Whether you're interested in:

  • Implementing new tool integrations
  • Improving the AI assistant's capabilities
  • Enhancing the UI/UX
  • Writing documentation
  • Testing the system

Your contributions are welcome! See CONTRIBUTING.md for how to get started.

🔍 Overview

The Model Context Provider (MCP) is an open-source framework that bridges AI with penetration testing tools. MCP interfaces with a wide array of pentesting tools, parses and enriches their output in real-time, and strictly follows the standard penetration testing process. It guides human pentesters through each phase – from reconnaissance and scanning to exploitation, post-exploitation, and reporting – aligning with established methodologies.

⚠️ Disclaimer: This tool is intended for legal security testing with proper authorization. Misuse of this software for unauthorized access to systems is illegal and unethical.

✨ Key Features

  • Methodology Enforcement: Ensures each engagement progresses through proper phases (reconnaissance → scanning → exploitation → post-exploitation → reporting) in order.
  • Real-time Context Aggregation: Captures tool outputs, normalizes the data into a unified engagement context, and stores it for analysis.
  • LLM-Powered Insights: Leverages a large language model to interpret findings and provide guidance during the engagement.
  • Seamless Tool Integration: Acts as a middleware layer that hooks into major pentest tools, converting their results into a common event format.
  • Secure Data Handling: Enforces strict security on processed data, including sanitization when interacting with the LLM.
  • Reporting and Knowledge Retention: Logs all findings and actions in a structured format for report generation.

🏗️ Architecture

MCP is built on a microservices-based, event-driven system deployed in a containerized environment:

  • Core Context Processing Engine: Central brain that aggregates and normalizes data from all tools
  • AI-Powered Attack Path Analyzer: Identifies potential attack paths and prioritizes targets
  • Plugin-Based Integration Framework: Extensible system for interfacing with external tools
  • Secure Logging & Reporting Module: Maintains engagement logs and produces reports
  • Real-Time LLM Query Interface: Provides natural language interface for querying findings
  • Role-Based Access Control: Enforces security across all operations

🧰 Integrated Tools

MCP currently integrates with the following tools:

Network Scanning & Enumeration

  • Nmap: Network discovery and security auditing
  • Masscan: High-speed port scanner

Web Enumeration

  • Gobuster: Directory and file brute forcing
  • Nikto: Web server scanner for vulnerabilities

Exploitation & Post-Exploitation

Password Attacks

Privilege Escalation

  • LinPEAS: Linux Privilege Escalation enumeration script

🚀 Getting Started

Prerequisites

  • Docker and Docker Compose
  • Python 3.8+
  • Network connectivity to target environments
  • Proper authorizations and scope definitions for penetration testing

Installation

  1. Clone this repository:
git clone https://github.com/allsmog/mcp-pentest.git
cd mcp-pentest
  1. Build the Docker containers:
docker-compose build
  1. Start the MCP services:
docker-compose up -d

Basic Usage

  1. Create a new penetration testing engagement:
curl -X POST http://localhost:8000/api/engagements -H "Content-Type: application/json" -d '{"name": "Example Corp Assessment", "scope": {"ip_ranges": ["192.168.1.0/24"], "domains": ["example.com"]}}'
  1. Start a reconnaissance scan:
curl -X POST http://localhost:8000/api/tasks -H "Content-Type: application/json" -d '{"engagement_id": "YOUR_ENGAGEMENT_ID", "tool": "theHarvester", "parameters": {"target": "example.com"}}'
  1. Query the AI assistant:
curl -X POST http://localhost:8000/api/query -H "Content-Type: application/json" -d '{"engagement_id": "YOUR_ENGAGEMENT_ID", "query": "What are the most promising attack vectors based on our current findings?"}'

See our documentation for complete API references and examples.

📋 Project Roadmap

Here's what we're currently working on:

  • Completing core Context Engine implementation
  • Finishing initial tool integrations
  • Building the AI-powered attack path analyzer
  • Developing the web UI
  • Creating comprehensive test suite
  • Adding additional tool integrations
  • Implementing report generation

We welcome contributions to any of these areas!

🤝 Contributing

Contributions are welcome and appreciated! Please see CONTRIBUTING.md for guidelines.

How You Can Help

We're particularly looking for help with:

  1. Tool Integrations: Adding support for more security tools
  2. Testing: Real-world testing and bug reporting
  3. Documentation: Improving and expanding guides
  4. UI Development: Building the web interface
  5. AI Components: Enhancing LLM integration and attack path analysis

Adding New Tool Integrations

We especially welcome contributions for new tool integrations. See our Tool Integration Guide for how to add support for additional tools.

💬 Community

  • Issues: Use GitHub issues for bug reports and feature requests
  • Discussions: GitHub discussions for general questions and ideas

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.

🔐 Security Considerations

Given the nature of this tool, please be especially mindful of security:

  • Never commit credentials, API keys, or sensitive information
  • Always follow responsible disclosure practices
  • Ensure proper authorization before testing any systems

📚 Documentation

🙏 Acknowledgments

  • Thanks to all the open-source penetration testing tools this project builds upon
  • Special recognition to the security researchers and tool developers who inspire this work

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • Bora Yalcin
  • Evaluator for marketplace product descriptions, checks for relevancy and keyword stuffing.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • https://jgadvisorycpa.com
  • This GPT assists in finding a top-rated business CPA - local or virtual. We account for their qualifications, experience, testimonials and reviews. Business operators provide a short description of your business, services wanted, and city or state.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • Contraband Interactive
  • Emulating Dr. Jordan B. Peterson's style in providing life advice and insights.

  • rustassistant.com
  • Your go-to expert in the Rust ecosystem, specializing in precise code interpretation, up-to-date crate version checking, and in-depth source code analysis. I offer accurate, context-aware insights for all your Rust programming questions.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • apappascs
  • 发现市场上最全面,最新的MCP服务器集合。该存储库充当集中式枢纽,提供了广泛的开源和专有MCP服务器目录,并提供功能,文档链接和贡献者。

  • ShrimpingIt
  • MCP系列GPIO Expander的基于Micropython I2C的操作,源自ADAFRUIT_MCP230XX

  • modelcontextprotocol
  • 模型上下文协议服务器

  • OffchainLabs
  • 进行以太坊的实施

  • Mintplex-Labs
  • 带有内置抹布,AI代理,无代理构建器,MCP兼容性等的多合一桌面和Docker AI应用程序。

  • huahuayu
  • 统一的API网关,用于将多个Etherscan样区块链Explorer API与对AI助手的模型上下文协议(MCP)支持。

    Reviews

    4 (1)
    Avatar
    user_lLJKch0R
    2025-04-15

    The Canvas Assignment Assistant MCP Server by mbcrosier is a game-changer for managing assignments. It seamlessly integrates with Canvas, providing a streamlined and efficient user experience. The intuitive interface and robust functionality make it an essential tool for both educators and students. Highly recommend! Check it out: https://mcp.so/server/canvas-mcp/mbcrosier