Get the FREE Ultimate OpenClaw Setup Guide →

Automated-Pentest-Suite

A dockerized Pentest-Suite capable of running AI-Powered full security checks .

Installation
Run this command in your terminal to add the MCP server to Claude Code.
Run in terminal:
Command
claude mcp add --transport stdio fdehech-automated-pentest-suite node server.js

How to use

The Automated Pentest Suite MCP server is designed to orchestrate automated penetration testing workflows. While the project is in active development, it aims to provide a set of tools that can run reconnaissance, vulnerability scanning, exploitation attempts, and reporting tasks in an automated fashion. The server exposes modular capabilities that can be extended as new pentest modules are implemented, making it possible to chain tools and generate consolidated results. To start using it, ensure the MCP server host is running and connect to it via the configured entry point (typically the server’s API or CLI provided by the project). As modules are added, you will be able to trigger specific pentest tasks, monitor progress, and collect structured reports.

Note: Given the early development status, tool availability, configuration options, and task orchestration commands may evolve. Refer to the repository’s docs or release notes for the latest capabilities and usage patterns, including any module-specific flags, result formats, and authentication requirements.

How to install

Prerequisites:

  • Node.js (v14+ recommended) and npm installed on your system
  • Git to clone the repository

Installation steps:

  1. Clone the repository: git clone https://github.com/your-org/Automated-Pentest-Suite.git cd Automated-Pentest-Suite

  2. Install dependencies: npm install

  3. (Optional) Build if a build step is provided in package.json: npm run build

  4. Start the server (adjust command if different in your setup): npm run start

    or if using the direct node entry point:

    node server.js

  5. Verify the server is running by checking logs or visiting the API endpoint as documented in the repository.

If you are deploying in a different environment, consult the project’s README for environment-specific steps (Docker, CI/CD, etc.).

Additional notes

• This project is under active development; APIs, CLI commands, and module interfaces may change between releases. • Check for breaking changes when upgrading to newer versions. • If authentication is required, ensure proper credentials are configured in environment variables or configuration files as documented. • Review module compatibility and required dependencies before enabling new pentest modules. • For production deployments, consider securing access to the MCP server and implementing access controls for sensitive pentest operations and results.

Related MCP Servers

Sponsor this space

Reach thousands of developers