MCP Pentest
Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
No arguments | |||
Capabilities
Server capabilities have not been inspected yet.
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| nmap_scanC | Perform comprehensive port scan using Nmap |
| subdomain_enumC | Enumerate subdomains of target domain using multiple methods |
| tech_detectionC | Detect technologies used by target website |
| directory_bruteforceC | Bruteforce directories and files on web server |
| nuclei_scanC | Run Nuclei vulnerability scanner |
| nikto_scanC | Run Nikto web vulnerability scanner |
| sqlmap_scanC | Test for SQL injection vulnerabilities |
| metasploit_searchC | Search for Metasploit modules based on detected services |
| exploit_attemptC | Attempt exploitation using detected vulnerabilities |
| auto_pentestC | Perform comprehensive automated penetration test |
| suggest_next_stepsC | Analyze current findings and suggest next steps |
| generate_reportC | Generate comprehensive penetration test report |
| cve_discoveryC | Discover CVEs based on detected technologies and versions |
| parameter_extractionC | Extract parameters from web applications using Katana and manual methods |
| fuzzing_parametersC | Fuzz extracted parameters with various payloads using ffuf/wfuzz |
| fuzzing_directoriesC | Fuzz directories and files using ffuf/wfuzz |
| directory_scanC | Advanced directory scanning with dirb/dirsearch/gobuster/feroxbuster |
| adaptive_strategyC | Generate adaptive penetration testing strategy based on detected services and OS |
| test_active_directoryC | Comprehensive Active Directory penetration testing |
| test_web_applicationC | Technology-specific web application penetration testing |
| test_smb_serviceC | Comprehensive SMB/NetBIOS service testing |
| burp_startC | Start Burp Suite Professional with API enabled |
| burp_stopB | Stop Burp Suite instance |
| burp_active_scanC | Perform active vulnerability scan using Burp Suite |
| burp_proxy_scanC | Perform passive scan through Burp Suite proxy |
| burp_spiderC | Spider/crawl target using Burp Suite |
| burp_exportC | Export Burp Suite scan results |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'
If you have feedback or need assistance with the MCP directory API, please join our Discord server