Skip to main content
Glama

Hacking Buddy MCP

README.md2.62 kB
# Hacking Buddy MCP **Hacking Buddy MCP** is a proof-of-concept project that explores how AI can be integrated into security operations, particularly within Red Team and Pentesting workflows. I created this tool to demonstrate practical ways in which AI can assist during offensive security engagements from reconnaissance and exploitation support to analyzing collected data. Since Red Teaming and Pentesting is where I spend most of my time, this project reflects both some of my hands-on experience and my interest in innovating with AI in the security space. > Note: This project currently includes only a few integrated tools, but I plan to add more over time as I experiment with different scenarios. My goal is to keep it fun and iterative—sharing progress as I go instead of waiting to launch a fully built-out version later. --- ## VSCode + GitHub Copilot Hacking Buddy MCP is setup including the .vscode directory which contains the `mcp.json` file. - You will need to adjust the `path` (the last argument) in the `mcp.json` to match your configuration. --- # Setup ## Pre-requisites You need to have `uv` and dependencies (`FastMCP`) installed. ### Install uv: ```shell curl -LsSf https://astral.sh/uv/install.sh | sh ``` See [uv installation guide](https://docs.astral.sh/uv/getting-started/installation/) > ⚠️ It is highly recommended that you setup a virtual environment first! > 1. Run `uv venv` to create a virtual environment > 2. Run `source .venv/bin/activate` to active the virtual enviroment ### Install dependencies from `pyproject.toml` This allows you to automatically install the dependencies from a file. Run: ```shell uv pip install -r pyproject.toml ``` ### Install dependencies manually #### Install FastMCP ```shell uv pip install fastmcp ``` See the [FastMCP GitHub](https://github.com/jlowin/fastmcp). --- ### Running the MCP server within VSCode Running the MCP server is actually pretty easy: 1. In VSCode go to the mcp.json 2. Click Start above the JSON object, right above where it says "hacking-buddy-mcp" ![Starting MCP Server](.img/MCP-Start.png) 3. Open GitHub Copilot and change it's mode to **Agent** ![Change GitHub Copilot to Agent Mode](.img/ChangeToAgentMode.png) 4. Ask it to perform one of the actions available from Hacking Buddy MCP Tools, like "Do an nmap discovery scan on this ip range 192.168.1.0/24" and "Run port scans on those hosts" > ⚠ Note: If GitHub Copilot starts acting up you may need to start a new chat! --- > 🚧 This is an experimental project, feedback and ideas are always welcome! ---

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/ManuelBerrueta/hacking-buddy-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server