MCP Hub
Back to servers

pentesting-cyber-mcp

šŸ” 50+ MCP Security Servers for AI-Powered Pentesting | Integrate Nmap, Burp Suite, Nuclei, Shodan, BloodHound, Semgrep, Trivy | Model Context Protocol for Cybersecurity

Stars
4
Forks
3
Updated
Jan 27, 2026
Validated
Feb 3, 2026

Pentesting Cyber MCP

MCP Security License: MIT TypeScript MCP SDK Tools

50 MCP Servers for Security Tools

Standardized protocol interface for pentesting and bug bounty automation

Installation | Available Tools | Usage | Contributing


What is MCP?

Model Context Protocol (MCP) is an open protocol that standardizes how applications expose tools and capabilities. This repository provides MCP server implementations for 50 popular security tools.

Each MCP server:

  • Wraps a security tool with a standardized interface
  • Exposes tool functionality through MCP protocol
  • Can be used with any MCP-compatible client
  • Runs as a standalone process

Available MCP Servers

Reconnaissance (15)

MCP ServerToolDescription
amassAmassAttack surface mapping & subdomain enumeration
alterxAlterxSubdomain wordlist generator
assetfinderAssetfinderAsset discovery
ceroCeroCertificate-based subdomain discovery
crtshcrt.shCertificate transparency logs
dnsxdnsxDNS toolkit
httpxhttpxHTTP probing
katanaKatanaWeb crawler
gowitnessGoWitnessScreenshot utility
masscanMasscanPort scanner
shufflednsShuffleDNSDNS bruteforcer
subfinderSubfinderSubdomain enumeration
uncoverUncoverShodan/Censys/Fofa search
waybackurlsWaybackurlsWayback Machine URLs
notifyNotifyNotification streaming

Vulnerability Scanning (11)

MCP ServerToolDescription
nucleiNucleiTemplate-based scanner
nmapNmapNetwork scanner
sqlmapSQLmapSQL injection
ffufFFUFWeb fuzzer
arjunArjunParameter discovery
smugglerSmugglerRequest smuggling
wpscanWPScanWordPress scanner
nessusNessusVulnerability scanner
dalfoxDalfoxXSS scanner
zapOWASP ZAPWeb app scanner
burpsuiteBurp SuiteWeb security testing

Exploitation & Password (3)

MCP ServerToolDescription
metasploitMetasploitExploitation framework
hydraTHC-HydraPassword brute force
hashcatHashcatPassword cracking

Cloud Security (4)

MCP ServerToolDescription
prowlerProwlerAWS/Azure/GCP security
scoutsuiteScoutSuiteCloud auditing
trivyTrivyContainer/IaC scanner
checkovCheckovIaC security

Kubernetes Security (3)

MCP ServerToolDescription
kube-hunterkube-hunterK8s penetration testing
kubeauditkubeauditK8s security audit
kube-benchkube-benchCIS benchmark

Threat Intelligence (3)

MCP ServerToolDescription
shodanShodanInternet search engine
virustotalVirusTotalMalware analysis
bloodhoundBloodHoundAD attack paths

Code Security (2)

MCP ServerToolDescription
semgrepSemgrepStatic analysis
gitleaksGitleaksSecret detection

Network & AD (2)

MCP ServerToolDescription
crackmapexecCrackMapExecAD/SMB toolkit
ghidraGhidraReverse engineering

Specialized (7)

MCP ServerToolDescription
acunetixAcunetixWeb vulnerability scanner
mobsfMobSFMobile security
sslscanSSLScanSSL/TLS testing
http-headersCustomSecurity headers
commixCommixCommand injection
nextjs-scannerCustomNext.js CVE scanner
unifiedAll-in-oneSingle server for all tools

Installation

Prerequisites

  • Node.js 18+
  • The underlying security tool installed
  • Any MCP-compatible client

Install Individual Server

# Clone the repository
git clone https://github.com/hackersatyamrastogi/pentesting-cyber-mcp.git
cd pentesting-cyber-mcp

# Install dependencies
pnpm install

# Build all servers
pnpm build

# Or build specific server
cd servers/nmap && pnpm build

Run MCP Server

# Run nmap MCP server
node servers/nmap/build/index.js /usr/bin/nmap

# Run nuclei MCP server
node servers/nuclei/build/index.js /usr/bin/nuclei

# Run metasploit MCP server
node servers/metasploit/build/index.js msfconsole

Configuration

MCP Client Configuration

Add to your MCP client config:

{
  "mcpServers": {
    "nmap": {
      "command": "node",
      "args": ["path/to/servers/nmap/build/index.js", "/usr/bin/nmap"]
    },
    "nuclei": {
      "command": "node",
      "args": ["path/to/servers/nuclei/build/index.js", "nuclei"]
    },
    "sqlmap": {
      "command": "node",
      "args": ["path/to/servers/sqlmap/build/index.js", "sqlmap"]
    },
    "metasploit": {
      "command": "node",
      "args": ["path/to/servers/metasploit/build/index.js", "msfconsole"]
    }
  }
}

Unified Server (All Tools)

Use the unified server to access all 50 tools through a single MCP connection:

{
  "mcpServers": {
    "security-tools": {
      "command": "node",
      "args": ["path/to/servers/unified/build/index.js"]
    }
  }
}

Project Structure

pentesting-cyber-mcp/
ā”œā”€ā”€ servers/
│   ā”œā”€ā”€ nmap/
│   │   ā”œā”€ā”€ src/index.ts
│   │   ā”œā”€ā”€ package.json
│   │   └── README.md
│   ā”œā”€ā”€ nuclei/
│   ā”œā”€ā”€ sqlmap/
│   ā”œā”€ā”€ metasploit/
│   ā”œā”€ā”€ hydra/
│   ā”œā”€ā”€ hashcat/
│   ā”œā”€ā”€ ... (50 servers)
│   └── unified/
ā”œā”€ā”€ scripts/
│   └── generate-config.sh
ā”œā”€ā”€ package.json
└── README.md

Usage Example

Each MCP server exposes tools that can be called through the MCP protocol:

// Example: nmap MCP server exposes these tools
- nmap-scan          // Run port scan
- nmap-service-scan  // Service detection
- nmap-vuln-scan     // Vulnerability scripts

// Example: nuclei MCP server
- do-nuclei          // Run template scan
- get-nuclei-tags    // List available tags

// Example: metasploit MCP server
- msf-search         // Search modules
- msf-exploit-check  // Check vulnerability
- msfvenom-generate  // Generate payload

Security Notice

āš ļø For authorized testing only

  • Obtain proper authorization before scanning
  • Some tools require root/admin privileges
  • Follow responsible disclosure practices
  • Secure your API keys

See SECURITY.md for details.


Contributing

Contributions welcome! See CONTRIBUTING.md.

Add a new MCP server:

mkdir servers/my-tool
cd servers/my-tool
# Create src/index.ts, package.json, README.md

License

MIT License - see LICENSE

Author

Satyam Rastogi - @hackersatyamrastogi


Pentesting Cyber MCP

50 Security Tools • One Protocol

GitHub

Reviews

No reviews yet

Sign in to write a review