Skip to main content
Glama

๐Ÿ›ก๏ธ PenTest MCP

AI-Powered Security Scanning via Model Context Protocol (MCP)

PenTest MCP is a specialized MCP server that exposes 25+ professional security tools to AI agents like Claude Desktop. It enables security researchers and developers to orchestrate penetration testing through natural language, automating complex tool chains and generating professional reports.

Python 3.11+ MCP License: MIT


๐Ÿš€ Quick Start (Claude Desktop)

  1. Install dependencies:

    pip install -e .
  2. Configure Claude Desktop: Add the following to your claude_desktop_config.json:

    {
      "mcpServers": {
        "pentest": {
          "command": "python3",
          "args": [
            "-m",
            "pentest_mcp.mcp_server"
          ],
          "cwd": "/absolute/path/to/pentest-mcp"
        }
      }
    }
  3. Restart Claude Desktop and start scanning:


๐Ÿ—๏ธ Architecture

graph TD
    User([User / Claude Desktop]) <-->|MCP Protocol| Server[MCP Server]
    
    subgraph Server [PenTest MCP Server]
        direction TB
        Registry[Tool Registry]
        ServerLogic[MCP Handlers]
        
        subgraph Logic [Logic Layer]
            direction LR
            ScanModes[Scan Modes]
            Sessions[Session Manager]
            Reports[Report Engine]
        end
        
        subgraph Wrappers [Tool Wrappers]
            direction LR
            ProfTools[Professional Wrappers]
            Fallbacks[Python Fallbacks]
        end
    end
    
    Logic <--> Registry
    Registry <--> Wrappers
    
    ProfTools -->|Subprocess| ExtTools[External Tools: Nmap, Nuclei, Sqlmap, etc.]
    Reports <-->|API| Gemini[Gemini AI Engine]
    
    Sessions -->|Storage| SQLite[(SQLite DB)]
    Reports -->|Output| MD[Markdown Reports]

  • Claude Desktop Integration - Full orchestration via the Model Context Protocol.

  • 25+ Security Tools - Including nmap, sqlmap, nuclei, ffuf, nikto, testssl, and more.

  • Natural Language Orchestration - Ask security questions, Claude picks the right tools.

  • Preset Scan Modes - Quick Triage and Extensive Assessment modes.

  • AI-Generated Reports - Professional markdown reports powered by Gemini AI.

  • CVE Enrichment - Findings are automatically cross-referenced with CVE data.


๐Ÿ› ๏ธ Supported Tools (25)

Category

Tools

Reconnaissance

subfinder, wafw00f, nmap, whatweb, amass, dnsrecon, theharvester

Vulnerability Scanning

nuclei, sqlmap, dalfox, nikto, retire, commix, corscanner, graphql_cop

Web Fuzzing

ffuf, gobuster, wfuzz, arjun

TLS/SSL

sslyze, testssl

Advanced/OSINT

masscan, trufflehog, git_dumper, jwt_tool


๐Ÿ”ง Installation & Setup

Prerequisites

  • Python 3.11+

  • Gemini API Key (for reports and analysis)

  • (Recommended) External tools installed: nmap, sqlmap, ffuf, nuclei, etc.

Configuration

Create a .env file in the project root:

GEMINI_API_KEY=your_api_key_here
GEMINI_MODEL=gemini-flash-lite-latest

๐Ÿ“ Project Structure

pentest-mcp/
โ”œโ”€โ”€ pentest_mcp/
โ”‚   โ”œโ”€โ”€ mcp_server.py      # Main MCP server entry point
โ”‚   โ”œโ”€โ”€ scan_modes.py      # Quick & Extensive scan logic
โ”‚   โ”œโ”€โ”€ session.py         # Session & DB management
โ”‚   โ”œโ”€โ”€ report_engine.py   # AI report generation
โ”‚   โ”œโ”€โ”€ llm_providers.py   # Gemini API integration
โ”‚   โ”œโ”€โ”€ tools/             # Tool wrappers & logic
โ”‚   โ””โ”€โ”€ models.py          # Pydantic data models
โ”œโ”€โ”€ vulnerable-app/        # Local test target (Node.js)
โ”œโ”€โ”€ reports/               # Generated scan reports
โ””โ”€โ”€ pyproject.toml         # Project dependencies

๐Ÿ”’ Security Notice

This tool is for authorized security testing only.

  • Always obtain explicit written permission before scanning any target.

  • Unauthorized testing is illegal and unethical.

  • The consent flag is a mandatory requirement for all active scanning tools.


Built with ๐Ÿ Python ยท ๐Ÿง  Gemini AI ยท ๐Ÿ›ก๏ธ MCP

Install Server
A
license - permissive license
C
quality
C
maintenance

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/MohitSahoo/MCPToolForWebVulnerabilities-'

If you have feedback or need assistance with the MCP directory API, please join our Discord server