pentestMCP
by RamKansal·★ 65·Score 46
MCP server exposing 20+ penetration testing tools for AI-assisted security testing via Docker.
Overview
pentestMCP bridges Large Language Models with practical penetration testing tools through the Model Context Protocol. It functions as an MCP Server, exposing over 20 security assessment utilities (Nmap, Nuclei, ZAP, SQLMap, etc.) as callable tools within MCP-compatible clients. The server runs in a Docker container, communicating via stdio with client hosts like Claude Desktop or VS Code, enabling natural language control over complex security workflows. It implements asynchronous patterns for long-running scans and includes resource management features.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose pentestMCP when you need AI-powered integration with comprehensive security assessment tools and are already using MCP-compatible environments like Claude Desktop.
When NOT to choose this
Don't choose pentestMCP if you need a GUI-based pentesting interface, have strict containerization requirements that conflict with its Docker setup, or need support for non-MCP AI platforms.
Tools this server exposes
12 tools extracted from the READMErun_subfinderDiscovers subdomains using ProjectDiscovery's Subfinder.
launch_nmap_scanExecutes Nmap network scans asynchronously.
fetch_nmap_resultsRetrieves results from an asynchronous Nmap scan.
run_gobuster_scanPerforms directory/file/DNS bruteforcing with Gobuster asynchronously.
launch_nuclei_scanRuns template-based vulnerability scans with ProjectDiscovery's Nuclei asynchronously.
run_sqlmap_toolExecutes SQLmap for SQL injection testing asynchronously.
run_searchsploitSearches the local Exploit-DB database using Searchsploit.
ad_user_enumEnumerates users in Active Directory.
ad_bloodhound_collectCollects data for Active Directory analysis with BloodHound.
run_zap_active_scanPerforms an active scan with OWASP ZAP.
run_curl_toolExecutes cURL commands for HTTP interaction.
fetch_whois_dataRetrieves WHOIS information for a domain.
Comparable tools
Installation
Installation
Using Pre-built Docker Image (Recommended):
docker pull ramgameer/pentest-mcp:latestClaude Desktop Integration
Add to claude_desktop_config.json:
{
"mcpServers": {
"pentestMCP": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"ramgameer/pentest-mcp:latest"
]
}
}
}Restart Claude Desktop after configuration.
FAQ
- What is pentestMCP?
- pentestMCP is an MCP Server that exposes penetration testing tools (Nmap, Nuclei, ZAP, etc.) as callable tools for AI agents to use in security analysis.
- How do I integrate pentestMCP with Claude Desktop?
- Add the MCP server configuration to your claude_desktop_config.json file using the Docker run command provided in the README, then restart Claude Desktop.
Compare pentestMCP with
Last updated · Auto-generated from public README + GitHub signals.