Skip to main content
Glama

HackerMCP

HackerMCP

HackerMCP is a module built for AI assistants to access and utilize common penetration testing and security tools. This module enables AI systems to leverage powerful security tools through a simple interface.

Currently Supported Tools

  • Nmap: Network discovery and security auditing
  • Metasploit Framework: Penetration testing framework

Future Goals

  • Add support for SQLMap
  • Expand available security tools and capabilities

Installation

Add the following configuration to your MCP configuration file:

{ "mcpServers": { "hackermcp": { "command": "uv", "args": [ "--directory", "~/dir/to/hackermcp", "run", "hacker.py" ] } } }

Replace ~/dir/to/hackermcp with the actual path to the hackermcp directory.

Environment Setup

Prerequisites

  • Python 3.8 or higher
  • Nmap installed on your system
  • Metasploit Framework installed on your system

Virtual Environment Setup

  1. Clone the repository:
    git clone https://github.com/R3verseIN/HackerMCP cd HackerMCP
  2. Set up a virtual environment using uv:
    uv venv source .venv/bin/activate
  3. Install dependencies:
    uv pip install -r requirements.txt

Installing UV

If you don't have the uv package manager then install it:

pip3 install uv

Or use curl to download the installation script:

curl -LsSf https://astral.sh/uv/install.sh | sh

If your system doesn't have curl, you can use wget:

wget -qO- https://astral.sh/uv/install.sh | sh

Disclaimer

This tool is provided for educational and legitimate security testing purposes only.

No warranty is provided with this software. The creator is not responsible for any unethical or illegal use of this tool. Users are solely responsible for ensuring they have proper authorization before conducting any security testing activities.

License

GNU GPL v3 License

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Un módulo que permite a los asistentes de IA acceder y utilizar herramientas de seguridad y pruebas de penetración comunes como Nmap y Metasploit a través de una interfaz sencilla.

  1. Herramientas compatibles actualmente
    1. Metas futuras
      1. Instalación
        1. Configuración del entorno
          1. Prerrequisitos
          2. Configuración del entorno virtual
          3. Instalación de UV
        2. Descargo de responsabilidad
          1. Licencia

            Related MCP Servers

            • -
              security
              A
              license
              -
              quality
              Enables AI assistants to perform network scanning operations using NMAP, offering a standardized interface for network analysis and security assessments through AI conversations.
              Last updated -
              614
              28
              JavaScript
              MIT License
            • -
              security
              A
              license
              -
              quality
              Provides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.
              Last updated -
              73
              Python
              Apache 2.0
              • Linux
              • Apple
            • -
              security
              A
              license
              -
              quality
              A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.
              Last updated -
              8
              Python
              MIT License
            • -
              security
              A
              license
              -
              quality
              Enables secure integration with Metasploit Framework for AI assistants, providing comprehensive access to penetration testing tools, module management, payload generation, and database operations. Designed for authorized security testing and defensive analysis with 28 specialized tools covering complete MSF functionality.
              Last updated -
              Python
              MIT License

            View all related MCP servers

            MCP directory API

            We provide all the information about MCP servers via our MCP API.

            curl -X GET 'https://glama.ai/api/mcp/v1/servers/R3verseIN/HackerMCP'

            If you have feedback or need assistance with the MCP directory API, please join our Discord server