HackerMCP is a module built for AI assistants to access and utilize common penetration testing and security tools. This module enables AI systems to leverage powerful security tools through a simple interface.
- Nmap: Network discovery and security auditing
- Metasploit Framework: Penetration testing framework
- Add support for SQLMap
- Expand available security tools and capabilities
Add the following configuration to your MCP configuration file:
{
"mcpServers": {
"hackermcp": {
"command": "uv",
"args": [
"--directory",
"~/dir/to/hackermcp",
"run",
"hacker.py"
]
}
}
}
Replace ~/dir/to/hackermcp
with the actual path to the hackermcp directory.
- Python 3.8 or higher
- Nmap installed on your system
- Metasploit Framework installed on your system
-
Clone the repository:
git clone https://github.com/R3verseIN/HackerMCP cd HackerMCP
-
Set up a virtual environment using
uv
:uv venv source .venv/bin/activate
-
Install dependencies:
uv pip install -r requirements.txt
If you don't have the uv
package manager then install it:
pip3 install uv
Or use curl to download the installation script:
curl -LsSf https://astral.sh/uv/install.sh | sh
If your system doesn't have curl, you can use wget:
wget -qO- https://astral.sh/uv/install.sh | sh
This tool is provided for educational and legitimate security testing purposes only.
No warranty is provided with this software. The creator is not responsible for any unethical or illegal use of this tool. Users are solely responsible for ensuring they have proper authorization before conducting any security testing activities.