Skip to main content
Glama
127,390 tools. Last updated 2026-05-05 15:32

"Information on Penetration Testing (Pentest)" matching MCP tools:

  • Perform penetration testing on web applications to identify security vulnerabilities using configurable test types and depth levels for comprehensive security assessment.
  • Generate penetration testing strategies by analyzing detected services, technologies, and vulnerabilities to create targeted security assessments.
  • Conducts technology-specific penetration testing on web applications to identify security vulnerabilities based on detected technologies like WordPress, Apache, or PHP.
  • Perform Active Directory penetration testing to identify security vulnerabilities in domain controllers and network configurations.
  • Create penetration test reports in multiple formats to document security assessment findings and vulnerabilities for authorized testing targets.

Matching MCP Servers

  • F
    license
    -
    quality
    C
    maintenance
    Provides access to over 40 industry-standard penetration testing tools, including Nmap, SQLMap, and Metasploit, within an isolated Kali Linux Docker container. It enables security professionals to perform comprehensive network reconnaissance, web application testing, and vulnerability research through natural language commands.
    Last updated
  • F
    license
    C
    quality
    D
    maintenance
    An automated penetration testing framework that enables intelligent security assessments through reconnaissance, vulnerability scanning, and controlled exploitation. Features AI-driven workflow management with comprehensive reporting for authorized security testing.
    Last updated
    27
    6

Matching MCP Connectors

  • ship-on-friday MCP — wraps StupidAPIs (requires X-API-Key)

  • Hosted SEO MCP server for URL + keyword scans, entity coverage, competitor gaps, and internal-link opportunities for AI agents.

  • Perform automated penetration testing to identify security vulnerabilities through reconnaissance, scanning, and controlled exploitation for authorized security assessments.
  • Generate realistic INSERT statements for development and testing that respect schema types, constraints, and foreign key relationships without executing.
  • Perform quick reconnaissance on web targets to identify robots.txt, security.txt, common directories, and response headers for security assessment and penetration testing.
    MIT
  • Retrieve detailed information about a Heroku add-on, including plan state, billing details, and configuration. Supports identifiers like add-on ID, name, or attachment name, requiring app context for attachments.
  • Analyze TLS handshakes, SNI values, and certificate data in PCAP files to extract security information for network forensics and penetration testing.
    MIT
  • Retrieve EVM block information by block number on Minievm chains. Supports L1 and L2 networks, optional full transaction objects.
    Apache 2.0
  • Retrieve detailed information about specific pages on the Old School RuneScape Wiki by providing comma-separated titles, enabling quick access to essential game data and references.