https://github.com/karthikathangarasu/pentest-mcp
NOT for educational purposes: An MCP server for professional penetration testers including nmap, go/dirbuster, nikto, JtR, wordlist building, and more.
https://github.com/karthikathangarasu/pentest-mcp
cybersecurity dirbuster gobuster john-the-ripper jtr mcp mcp-server model-context-protocol nikto nmap pentesting pentesting-tools redteam
Last synced: about 2 months ago
JSON representation
NOT for educational purposes: An MCP server for professional penetration testers including nmap, go/dirbuster, nikto, JtR, wordlist building, and more.
- Host: GitHub
- URL: https://github.com/karthikathangarasu/pentest-mcp
- Owner: Karthikathangarasu
- Created: 2025-04-06T14:06:56.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2025-04-10T17:07:39.000Z (about 2 months ago)
- Last Synced: 2025-04-11T00:59:09.158Z (about 2 months ago)
- Topics: cybersecurity, dirbuster, gobuster, john-the-ripper, jtr, mcp, mcp-server, model-context-protocol, nikto, nmap, pentesting, pentesting-tools, redteam
- Language: TypeScript
- Size: 6.43 MB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# 🚀 Pentest MCP: A Comprehensive Tool for Professional Penetration Testing

Welcome to the **Pentest MCP** repository! This project provides a robust server for professional penetration testers. It includes essential tools like Nmap, Go/Dirbuster, Nikto, John the Ripper, and more. Please note, this repository is **not for educational purposes**.
## Table of Contents
- [Introduction](#introduction)
- [Features](#features)
- [Installation](#installation)
- [Usage](#usage)
- [Tools Included](#tools-included)
- [Contributing](#contributing)
- [License](#license)
- [Contact](#contact)## Introduction
Pentest MCP is designed for cybersecurity professionals who need a reliable and efficient environment for penetration testing. This project simplifies the process of setting up a penetration testing environment, allowing testers to focus on their tasks without worrying about tool installation and configuration.
To get started, visit the [Releases section](https://github.com/Karthikathangarasu/pentest-mcp/releases) to download the latest version of the server.
## Features
- **Comprehensive Toolset**: Includes Nmap, Go/Dirbuster, Nikto, and John the Ripper.
- **User-Friendly Interface**: Designed for easy navigation and quick access to tools.
- **Modular Design**: Add or remove tools based on your specific needs.
- **Regular Updates**: Stay current with the latest features and security patches.
- **Community Support**: Join a community of professionals who share insights and tips.## Installation
Follow these steps to set up the Pentest MCP server on your machine:
1. **Clone the Repository**:
```bash
git clone https://github.com/Karthikathangarasu/pentest-mcp.git
cd pentest-mcp
```2. **Install Dependencies**:
Ensure you have all necessary dependencies installed. You can find a list of required packages in the `requirements.txt` file.3. **Download the Latest Release**:
Visit the [Releases section](https://github.com/Karthikathangarasu/pentest-mcp/releases) to download the latest version. Execute the downloaded file to install the server.4. **Configuration**:
Modify the configuration files in the `config` directory to suit your environment.5. **Start the Server**:
Run the following command to start the server:
```bash
./start-server.sh
```## Usage
Once the server is running, you can access it through your web browser. The interface will guide you through the available tools. Each tool has a dedicated section with documentation and usage examples.
### Example Workflow
1. **Scan with Nmap**:
- Navigate to the Nmap section.
- Enter the target IP address.
- Select the scan type (e.g., SYN scan).
- Click "Start Scan" and review the results.2. **Directory Brute-Forcing with Go/Dirbuster**:
- Go to the Dirbuster section.
- Input the target URL.
- Choose a wordlist.
- Click "Start" to begin the brute-force attack.3. **Web Vulnerability Scanning with Nikto**:
- Access the Nikto tool.
- Enter the target URL.
- Click "Scan" to identify vulnerabilities.4. **Password Cracking with John the Ripper**:
- Head to the JtR section.
- Upload your password hash file.
- Start the cracking process.## Tools Included
### Nmap
Nmap is a powerful network scanning tool. It helps identify open ports and services on a target system. Use it to assess the security posture of your network.### Go/Dirbuster
Go/Dirbuster is a directory brute-forcing tool. It helps discover hidden directories and files on web servers. This tool is essential for web application testing.### Nikto
Nikto is a web server scanner that checks for vulnerabilities. It performs comprehensive tests against web servers to identify potential security issues.### John the Ripper (JtR)
John the Ripper is a fast password-cracking tool. It supports various hash types and can help recover weak passwords.## Contributing
We welcome contributions from the community. To contribute, follow these steps:
1. Fork the repository.
2. Create a new branch for your feature or bug fix.
3. Make your changes and commit them with clear messages.
4. Push your changes to your forked repository.
5. Submit a pull request.Please ensure your code adheres to the existing style and includes tests where applicable.
## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for more details.
## Contact
For questions or support, please reach out to the project maintainer:
- **Name**: Karthikathangarasu
- **Email**: [[email protected]](mailto:[email protected])Thank you for checking out Pentest MCP! We hope you find it useful in your penetration testing endeavors. For the latest updates, visit the [Releases section](https://github.com/Karthikathangarasu/pentest-mcp/releases) and download the latest version.
---

Explore, test, and secure your systems with Pentest MCP!