Cover image
Try Now
2025-04-14

不是出于教育目的:用于专业渗透测试仪的MCP服务器,包括NMAP,GO/Dirbuster,Nikto,JTR,WordList Building等。

3 years

Works with Finder

1

Github Watches

0

Github Forks

2

Github Stars

🚀 Pentest MCP: A Comprehensive Tool for Professional Penetration Testing

Pentest MCP

Welcome to the Pentest MCP repository! This project provides a robust server for professional penetration testers. It includes essential tools like Nmap, Go/Dirbuster, Nikto, John the Ripper, and more. Please note, this repository is not for educational purposes.

Table of Contents

Introduction

Pentest MCP is designed for cybersecurity professionals who need a reliable and efficient environment for penetration testing. This project simplifies the process of setting up a penetration testing environment, allowing testers to focus on their tasks without worrying about tool installation and configuration.

To get started, visit the Releases section to download the latest version of the server.

Features

  • Comprehensive Toolset: Includes Nmap, Go/Dirbuster, Nikto, and John the Ripper.
  • User-Friendly Interface: Designed for easy navigation and quick access to tools.
  • Modular Design: Add or remove tools based on your specific needs.
  • Regular Updates: Stay current with the latest features and security patches.
  • Community Support: Join a community of professionals who share insights and tips.

Installation

Follow these steps to set up the Pentest MCP server on your machine:

  1. Clone the Repository:

    git clone https://github.com/Karthikathangarasu/pentest-mcp.git
    cd pentest-mcp
    
  2. Install Dependencies: Ensure you have all necessary dependencies installed. You can find a list of required packages in the requirements.txt file.

  3. Download the Latest Release: Visit the Releases section to download the latest version. Execute the downloaded file to install the server.

  4. Configuration: Modify the configuration files in the config directory to suit your environment.

  5. Start the Server: Run the following command to start the server:

    ./start-server.sh
    

Usage

Once the server is running, you can access it through your web browser. The interface will guide you through the available tools. Each tool has a dedicated section with documentation and usage examples.

Example Workflow

  1. Scan with Nmap:

    • Navigate to the Nmap section.
    • Enter the target IP address.
    • Select the scan type (e.g., SYN scan).
    • Click "Start Scan" and review the results.
  2. Directory Brute-Forcing with Go/Dirbuster:

    • Go to the Dirbuster section.
    • Input the target URL.
    • Choose a wordlist.
    • Click "Start" to begin the brute-force attack.
  3. Web Vulnerability Scanning with Nikto:

    • Access the Nikto tool.
    • Enter the target URL.
    • Click "Scan" to identify vulnerabilities.
  4. Password Cracking with John the Ripper:

    • Head to the JtR section.
    • Upload your password hash file.
    • Start the cracking process.

Tools Included

Nmap

Nmap is a powerful network scanning tool. It helps identify open ports and services on a target system. Use it to assess the security posture of your network.

Go/Dirbuster

Go/Dirbuster is a directory brute-forcing tool. It helps discover hidden directories and files on web servers. This tool is essential for web application testing.

Nikto

Nikto is a web server scanner that checks for vulnerabilities. It performs comprehensive tests against web servers to identify potential security issues.

John the Ripper (JtR)

John the Ripper is a fast password-cracking tool. It supports various hash types and can help recover weak passwords.

Contributing

We welcome contributions from the community. To contribute, follow these steps:

  1. Fork the repository.
  2. Create a new branch for your feature or bug fix.
  3. Make your changes and commit them with clear messages.
  4. Push your changes to your forked repository.
  5. Submit a pull request.

Please ensure your code adheres to the existing style and includes tests where applicable.

License

This project is licensed under the MIT License. See the LICENSE file for more details.

Contact

For questions or support, please reach out to the project maintainer:

Thank you for checking out Pentest MCP! We hope you find it useful in your penetration testing endeavors. For the latest updates, visit the Releases section and download the latest version.


Cybersecurity

Explore, test, and secure your systems with Pentest MCP!

相关推荐

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Alexandru Strujac
  • Efficient thumbnail creator for YouTube videos

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Lists Tailwind CSS classes in monospaced font

  • lumpenspace
  • Take an adjectivised noun, and create images making it progressively more adjective!

  • https://appia.in
  • Siri Shortcut Finder – your go-to place for discovering amazing Siri Shortcuts with ease

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • tomoyoshi hirata
  • Sony α7IIIマニュアルアシスタント

  • apappascs
  • 发现市场上最全面,最新的MCP服务器集合。该存储库充当集中式枢纽,提供了广泛的开源和专有MCP服务器目录,并提供功能,文档链接和贡献者。

  • ShrimpingIt
  • MCP系列GPIO Expander的基于Micropython I2C的操作,源自ADAFRUIT_MCP230XX

  • jae-jae
  • MCP服务器使用剧作《无头浏览器》获取网页内容。

  • ravitemer
  • 一个功能强大的Neovim插件,用于管理MCP(模型上下文协议)服务器

  • patruff
  • Ollama和MCP服务器之间的桥梁,使本地LLMS可以使用模型上下文协议工具

  • pontusab
  • 光标与风浪冲浪社区,查找规则和MCP

  • JackKuo666
  • 🔍使AI助手可以通过简单的MCP接口搜索和访问PYPI软件包信息。

  • av
  • 毫不费力地使用一个命令运行LLM后端,API,前端和服务。

  • WangRongsheng
  • 🧑‍🚀 llm 资料总结(数据处理、模型训练、模型部署、 o1 模型、mcp 、小语言模型、视觉语言模型)|摘要世界上最好的LLM资源。

    Reviews

    4 (1)
    Avatar
    user_j2gkGqzr
    2025-04-17

    As a dedicated user of Pentest-MCP, I can confidently say this tool is a must-have for any security professional. Created by Karthikathangarasu, it's intuitive yet powerful, seamlessly aiding in penetration testing tasks. The comprehensive functionality and user-friendly interface make it an invaluable asset. Highly recommended! Check it out at https://github.com/Karthikathangarasu/pentest-mcp.