Skip to main content
Glama

HackerMCP

HackerMCP

HackerMCP 是一个专为 AI 助手构建的模块,用于访问和使用常见的渗透测试和安全工具。该模块使 AI 系统能够通过简单的界面利用强大的安全工具。

当前支持的工具

  • Nmap :网络发现和安全审计

  • Metasploit 框架:渗透测试框架

未来目标

  • 添加对 SQLMap 的支持

  • 扩展可用的安全工具和功能

安装

将以下配置添加到您的 MCP 配置文件:

{ "mcpServers": { "hackermcp": { "command": "uv", "args": [ "--directory", "~/dir/to/hackermcp", "run", "hacker.py" ] } } }

~/dir/to/hackermcp替换为 hackermcp 目录的实际路径。

环境设置

先决条件

  • Python 3.8 或更高版本

  • 您的系统上安装了 Nmap

  • 您的系统上安装了 Metasploit 框架

虚拟环境设置

  1. 克隆存储库:

    git clone https://github.com/R3verseIN/HackerMCP cd HackerMCP
  2. 使用uv设置虚拟环境:

    uv venv source .venv/bin/activate
  3. 安装依赖项:

    uv pip install -r requirements.txt

安装 UV

如果您没有uv包管理器,请安装它:

pip3 install uv

或者使用curl下载安装脚本:

curl -LsSf https://astral.sh/uv/install.sh | sh

如果你的系统没有 curl,你可以使用 wget:

wget -qO- https://astral.sh/uv/install.sh | sh

免责声明

此工具仅用于教育和合法的安全测试目的。

本软件不提供任何担保。开发者不对任何不道德或非法使用此工具的行为负责。用户应自行负责确保在进行任何安全测试活动之前获得适当的授权。

执照

GNU GPL v3 许可证

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

该模块使 AI 助手能够通过简单的界面访问和使用常见的渗透测试和安全工具(如 Nmap 和 Metasploit)。

  1. 当前支持的工具
    1. 未来目标
      1. 安装
        1. 环境设置
          1. 先决条件
          2. 虚拟环境设置
          3. 安装 UV
        2. 免责声明
          1. 执照

            Related MCP Servers

            • -
              security
              A
              license
              -
              quality
              Enables AI assistants to perform network scanning operations using NMAP, offering a standardized interface for network analysis and security assessments through AI conversations.
              Last updated -
              24
              33
              MIT License
            • -
              security
              A
              license
              -
              quality
              Provides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.
              Last updated -
              302
              Apache 2.0
              • Linux
              • Apple
            • -
              security
              A
              license
              -
              quality
              A lightweight, extensible cybersecurity toolkit that connects AI assistants to security tools through the Model Context Protocol (MCP), enabling AI-assisted security research, scanning, and analysis.
              Last updated -
              9
              MIT License
            • -
              security
              A
              license
              -
              quality
              Enables secure integration with Metasploit Framework for AI assistants, providing comprehensive access to penetration testing tools, module management, payload generation, and database operations. Designed for authorized security testing and defensive analysis with 28 specialized tools covering complete MSF functionality.
              Last updated -
              3
              MIT License

            View all related MCP servers

            MCP directory API

            We provide all the information about MCP servers via our MCP API.

            curl -X GET 'https://glama.ai/api/mcp/v1/servers/R3verseIN/HackerMCP'

            If you have feedback or need assistance with the MCP directory API, please join our Discord server