Welcome to the Pentest MCP repository! This project provides a robust server for professional penetration testers. It includes essential tools like Nmap, Go/Dirbuster, Nikto, John the Ripper, and more. Please note, this repository is not for educational purposes.
Pentest MCP is designed for cybersecurity professionals who need a reliable and efficient environment for penetration testing. This project simplifies the process of setting up a penetration testing environment, allowing testers to focus on their tasks without worrying about tool installation and configuration.
To get started, visit the Releases section to download the latest version of the server.
- Comprehensive Toolset: Includes Nmap, Go/Dirbuster, Nikto, and John the Ripper.
- User-Friendly Interface: Designed for easy navigation and quick access to tools.
- Modular Design: Add or remove tools based on your specific needs.
- Regular Updates: Stay current with the latest features and security patches.
- Community Support: Join a community of professionals who share insights and tips.
Follow these steps to set up the Pentest MCP server on your machine:
-
Clone the Repository:
git clone https://github.com/Karthikathangarasu/pentest-mcp.git cd pentest-mcp
-
Install Dependencies: Ensure you have all necessary dependencies installed. You can find a list of required packages in the
requirements.txt
file. -
Download the Latest Release: Visit the Releases section to download the latest version. Execute the downloaded file to install the server.
-
Configuration: Modify the configuration files in the
config
directory to suit your environment. -
Start the Server: Run the following command to start the server:
./start-server.sh
Once the server is running, you can access it through your web browser. The interface will guide you through the available tools. Each tool has a dedicated section with documentation and usage examples.
-
Scan with Nmap:
- Navigate to the Nmap section.
- Enter the target IP address.
- Select the scan type (e.g., SYN scan).
- Click "Start Scan" and review the results.
-
Directory Brute-Forcing with Go/Dirbuster:
- Go to the Dirbuster section.
- Input the target URL.
- Choose a wordlist.
- Click "Start" to begin the brute-force attack.
-
Web Vulnerability Scanning with Nikto:
- Access the Nikto tool.
- Enter the target URL.
- Click "Scan" to identify vulnerabilities.
-
Password Cracking with John the Ripper:
- Head to the JtR section.
- Upload your password hash file.
- Start the cracking process.
Nmap is a powerful network scanning tool. It helps identify open ports and services on a target system. Use it to assess the security posture of your network.
Go/Dirbuster is a directory brute-forcing tool. It helps discover hidden directories and files on web servers. This tool is essential for web application testing.
Nikto is a web server scanner that checks for vulnerabilities. It performs comprehensive tests against web servers to identify potential security issues.
John the Ripper is a fast password-cracking tool. It supports various hash types and can help recover weak passwords.
We welcome contributions from the community. To contribute, follow these steps:
- Fork the repository.
- Create a new branch for your feature or bug fix.
- Make your changes and commit them with clear messages.
- Push your changes to your forked repository.
- Submit a pull request.
Please ensure your code adheres to the existing style and includes tests where applicable.
This project is licensed under the MIT License. See the LICENSE file for more details.
For questions or support, please reach out to the project maintainer:
- Name: Karthikathangarasu
- Email: your-email@example.com
Thank you for checking out Pentest MCP! We hope you find it useful in your penetration testing endeavors. For the latest updates, visit the Releases section and download the latest version.
Explore, test, and secure your systems with Pentest MCP!