home / mcp / professional penetration testing mcp server
An MCP server delivering enterprise-grade pentesting tools inside a secure Docker/Kali environment for authorized assessments.
Configuration
View docs{
"mcpServers": {
"angry-althaf-pentest-mcp": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"--cap-add=NET_RAW",
"--cap-add=NET_ADMIN",
"--cap-add=NET_BIND_SERVICE",
"pentest-mcp-pro",
"python3",
"pentest_server.py"
]
}
}
}You have a secure MCP server that bundles 40+ professional penetration testing tools inside a controlled Docker environment. It enables AI-assisted security assessments for authorized engagements, providing isolated tool execution, strict input validation, and automatic results management to help you plan, run, and document professional pentests.
You connect to the professional MCP server from your MCP client (Claude Desktop) and run tool workflows in a secure, isolated container. Each workflow invokes a specific suite of pentest tools (network recon, web app testing, exploitation, password testing, post-exploitation, SSL/TLS checks, and wireless security) without exposing direct host access. Results are saved with timestamps and presented in a structured format for review and reporting.
Prerequisites you need before starting: Docker Desktop installed and running, Claude Desktop installed and up to date, Git available for cloning, and administrative privileges to run Docker commands.
git clone https://github.com/yourusername/pentest-mcp-server.git
cd pentest-mcp-server
docker build -t pentest-mcp-pro .
```
Note: Initial build may take 15โ30 minutes due to comprehensive tool installation.Configure Claude Desktop to load the professional MCP server. Add a connection named pentest_professional that runs the MCP server inside Docker and exposes the Python entry point pentest_server.py.
{
"mcpServers": {
"pentest_professional": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"--cap-add=NET_RAW",
"--cap-add=NET_ADMIN",
"--cap-add=NET_BIND_SERVICE",
"pentest-mcp-pro",
"python3",
"pentest_server.py"
]
}
}
}Restart Claude Desktop to initialize the new MCP server connection. In Claude Desktop, confirm that the professional pentest server is connected and exposes the 40+ tools. You can then select workflows to run, review results, and manage reports.
The MCP server runs tools inside a Kali-based container with input sanitization, non-root execution, and structured logging. Outputs are stored with timestamps to enable organized review and auditing.
Perform a comprehensive nmap scan on 192.168.1.0/24 with version detection
Run a stealth SYN scan on 10.0.0.1 ports 1-1000
Execute aggressive nmap scan with OS detection on target.local
Use masscan to quickly scan 192.168.1.0/24 for common ports at rate 5000
Enumerate subdomains for example.com using amass in passive modeNetwork reconnaissance tool with multiple scan types including stealth, version, aggressive, UDP, and vulnerability scripts.
High-speed port scanner for large networks with configurable scan rate.
DNS enumeration to test subdomains, nameservers, and zone configurations.
OWASP subdomain enumeration in passive or active modes.
Network path analysis to identify routing topology.
WHOIS lookup for domain registration data.
Web vulnerability scanner covering OWASP Top 10 with SSL/TLS support.
SQL injection testing across multiple DBMS with customizable risk and level.
WordPress security scanner with plugin, theme, and user enumeration.
Fast web fuzzer for directory, file, parameter, and vhost discovery.
Template-driven CVE and misconfiguration vulnerability detection.
WAF fingerprinting to detect web application firewalls.
Technology fingerprinting for CMS, frameworks, and server detection.
Directory, DNS, and VHost discovery with custom wordlists.
Web content brute-forcing with multiple wordlists.
Local ExploitDB search with exact matching.
Exploitation framework with module search and identification.
Network login brute-forcing across services with rate limiting.
Password hash cracking with multiple formats and custom wordlists.
GPU-accelerated cracking with advanced attack modes.
Automatic hash type detection.
SMB/Samba enumeration for users, shares, and policies.
SMB share auditing with permissions checks.
SSL/TLS cipher and protocol analysis.
Advanced SSL vulnerability scanning for common weaknesses.
Wireless security testing for WPA/WPA2 passwords from captures.