Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault

No arguments

Capabilities

Server capabilities have not been inspected yet.

Tools

Functions exposed to the LLM to take actions

NameDescription
nmap_scanC

Perform comprehensive port scan using Nmap

subdomain_enumC

Enumerate subdomains of target domain using multiple methods

tech_detectionC

Detect technologies used by target website

directory_bruteforceC

Bruteforce directories and files on web server

nuclei_scanC

Run Nuclei vulnerability scanner

nikto_scanC

Run Nikto web vulnerability scanner

sqlmap_scanC

Test for SQL injection vulnerabilities

metasploit_searchC

Search for Metasploit modules based on detected services

exploit_attemptC

Attempt exploitation using detected vulnerabilities

auto_pentestC

Perform comprehensive automated penetration test

suggest_next_stepsC

Analyze current findings and suggest next steps

generate_reportC

Generate comprehensive penetration test report

cve_discoveryC

Discover CVEs based on detected technologies and versions

parameter_extractionC

Extract parameters from web applications using Katana and manual methods

fuzzing_parametersC

Fuzz extracted parameters with various payloads using ffuf/wfuzz

fuzzing_directoriesC

Fuzz directories and files using ffuf/wfuzz

directory_scanC

Advanced directory scanning with dirb/dirsearch/gobuster/feroxbuster

adaptive_strategyC

Generate adaptive penetration testing strategy based on detected services and OS

test_active_directoryC

Comprehensive Active Directory penetration testing

test_web_applicationC

Technology-specific web application penetration testing

test_smb_serviceC

Comprehensive SMB/NetBIOS service testing

burp_startC

Start Burp Suite Professional with API enabled

burp_stopB

Stop Burp Suite instance

burp_active_scanC

Perform active vulnerability scan using Burp Suite

burp_proxy_scanC

Perform passive scan through Burp Suite proxy

burp_spiderC

Spider/crawl target using Burp Suite

burp_exportC

Export Burp Suite scan results

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'

If you have feedback or need assistance with the MCP directory API, please join our Discord server