Skip to main content
Glama

HackerMCP

HackerMCP is a module built for AI assistants to access and utilize common penetration testing and security tools. This module enables AI systems to leverage powerful security tools through a simple interface.

Currently Supported Tools

  • Nmap: Network discovery and security auditing

  • Metasploit Framework: Penetration testing framework

Future Goals

  • Add support for SQLMap

  • Expand available security tools and capabilities

Installation

Add the following configuration to your MCP configuration file:

{ "mcpServers": { "hackermcp": { "command": "uv", "args": [ "--directory", "~/dir/to/hackermcp", "run", "hacker.py" ] } } }

Replace ~/dir/to/hackermcp with the actual path to the hackermcp directory.

Environment Setup

Prerequisites

  • Python 3.8 or higher

  • Nmap installed on your system

  • Metasploit Framework installed on your system

Virtual Environment Setup

  1. Clone the repository:

    git clone https://github.com/R3verseIN/HackerMCP cd HackerMCP
  2. Set up a virtual environment using uv:

    uv venv source .venv/bin/activate
  3. Install dependencies:

    uv pip install -r requirements.txt

Installing UV

If you don't have the uv package manager then install it:

pip3 install uv

Or use curl to download the installation script:

curl -LsSf https://astral.sh/uv/install.sh | sh

If your system doesn't have curl, you can use wget:

wget -qO- https://astral.sh/uv/install.sh | sh

Disclaimer

This tool is provided for educational and legitimate security testing purposes only.

No warranty is provided with this software. The creator is not responsible for any unethical or illegal use of this tool. Users are solely responsible for ensuring they have proper authorization before conducting any security testing activities.

License

GNU GPL v3 License

-
security - not tested
A
license - permissive license
-
quality - not tested

Related MCP Servers

  • -
    security
    A
    license
    -
    quality
    Enables AI assistants to perform network scanning operations using NMAP, offering a standardized interface for network analysis and security assessments through AI conversations.
    Last updated -
    23
    37
    MIT License
  • -
    security
    A
    license
    -
    quality
    Provides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.
    Last updated -
    302
    Apache 2.0
    • Linux
    • Apple
  • -
    security
    A
    license
    -
    quality
    A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.
    Last updated -
    9
    MIT License
  • -
    security
    A
    license
    -
    quality
    Enables secure integration with Metasploit Framework for AI assistants, providing comprehensive access to penetration testing tools, module management, payload generation, and database operations. Designed for authorized security testing and defensive analysis with 28 specialized tools covering complete MSF functionality.
    Last updated -
    3
    MIT License

View all related MCP servers

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/R3verseIN/HackerMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server