Skip to content

NOT for educational purposes: An MCP server for professional penetration testers including nmap, go/dirbuster, nikto, JtR, wordlist building, and more.

Notifications You must be signed in to change notification settings

Karthikathangarasu/pentest-mcp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🚀 Pentest MCP: A Comprehensive Tool for Professional Penetration Testing

Pentest MCP

Welcome to the Pentest MCP repository! This project provides a robust server for professional penetration testers. It includes essential tools like Nmap, Go/Dirbuster, Nikto, John the Ripper, and more. Please note, this repository is not for educational purposes.

Table of Contents

Introduction

Pentest MCP is designed for cybersecurity professionals who need a reliable and efficient environment for penetration testing. This project simplifies the process of setting up a penetration testing environment, allowing testers to focus on their tasks without worrying about tool installation and configuration.

To get started, visit the Releases section to download the latest version of the server.

Features

  • Comprehensive Toolset: Includes Nmap, Go/Dirbuster, Nikto, and John the Ripper.
  • User-Friendly Interface: Designed for easy navigation and quick access to tools.
  • Modular Design: Add or remove tools based on your specific needs.
  • Regular Updates: Stay current with the latest features and security patches.
  • Community Support: Join a community of professionals who share insights and tips.

Installation

Follow these steps to set up the Pentest MCP server on your machine:

  1. Clone the Repository:

    git clone https://github.com/Karthikathangarasu/pentest-mcp.git
    cd pentest-mcp
  2. Install Dependencies: Ensure you have all necessary dependencies installed. You can find a list of required packages in the requirements.txt file.

  3. Download the Latest Release: Visit the Releases section to download the latest version. Execute the downloaded file to install the server.

  4. Configuration: Modify the configuration files in the config directory to suit your environment.

  5. Start the Server: Run the following command to start the server:

    ./start-server.sh

Usage

Once the server is running, you can access it through your web browser. The interface will guide you through the available tools. Each tool has a dedicated section with documentation and usage examples.

Example Workflow

  1. Scan with Nmap:

    • Navigate to the Nmap section.
    • Enter the target IP address.
    • Select the scan type (e.g., SYN scan).
    • Click "Start Scan" and review the results.
  2. Directory Brute-Forcing with Go/Dirbuster:

    • Go to the Dirbuster section.
    • Input the target URL.
    • Choose a wordlist.
    • Click "Start" to begin the brute-force attack.
  3. Web Vulnerability Scanning with Nikto:

    • Access the Nikto tool.
    • Enter the target URL.
    • Click "Scan" to identify vulnerabilities.
  4. Password Cracking with John the Ripper:

    • Head to the JtR section.
    • Upload your password hash file.
    • Start the cracking process.

Tools Included

Nmap

Nmap is a powerful network scanning tool. It helps identify open ports and services on a target system. Use it to assess the security posture of your network.

Go/Dirbuster

Go/Dirbuster is a directory brute-forcing tool. It helps discover hidden directories and files on web servers. This tool is essential for web application testing.

Nikto

Nikto is a web server scanner that checks for vulnerabilities. It performs comprehensive tests against web servers to identify potential security issues.

John the Ripper (JtR)

John the Ripper is a fast password-cracking tool. It supports various hash types and can help recover weak passwords.

Contributing

We welcome contributions from the community. To contribute, follow these steps:

  1. Fork the repository.
  2. Create a new branch for your feature or bug fix.
  3. Make your changes and commit them with clear messages.
  4. Push your changes to your forked repository.
  5. Submit a pull request.

Please ensure your code adheres to the existing style and includes tests where applicable.

License

This project is licensed under the MIT License. See the LICENSE file for more details.

Contact

For questions or support, please reach out to the project maintainer:

Thank you for checking out Pentest MCP! We hope you find it useful in your penetration testing endeavors. For the latest updates, visit the Releases section and download the latest version.


Cybersecurity

Explore, test, and secure your systems with Pentest MCP!

About

NOT for educational purposes: An MCP server for professional penetration testers including nmap, go/dirbuster, nikto, JtR, wordlist building, and more.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •