Two powerful projects under one roof. A full MCP server with 150+ security tools and autonomous exploit chaining. Plus 28 Claude Code subagents for instant red teaming. Both free. Both open source.
Both projects are free and open source. They serve different needs — pick the one that fits your workflow, or use both together.
MCP Server + Python Agents — 150+ Security Tools
The next-generation pentesting platform. An MCP server that exposes 150+ security tools to any AI client. Autonomous exploit chaining turns low-severity findings into full compromise. Every finding validated with working PoCs.
28 Claude Code Subagents — Zero Dependencies
The original project: 28 specialized AI subagents as plain Markdown files. Copy into any Claude Code project and start pentesting immediately. No setup, no build tools, no infrastructure.
A full pentesting platform built in Python with the Model Context Protocol. Connect any AI client and start assessing targets immediately.
Network scanning (nmap, masscan, rustscan), web testing (sqlmap, nuclei, ffuf), AD attacks (BloodHound, Impacket, CrackMapExec), cloud (Prowler, Pacu, Trivy), binary analysis (Ghidra, radare2, GDB), OSINT, password cracking, and more. Each with intelligent output parsers.
6 chain templates discover attack paths: Web→Shell, Subdomain Takeover→SSRF, AD Privilege Escalation, Cloud Metadata→Account Takeover, Container Escape, API→Database. Each step requires your approval.
Every finding validated with a safe, non-destructive proof of concept. Unconfirmed bugs never reach your report. Batch-validates entire scan reports in priority order.
Recon (6-phase), Web (8-phase), AD (7-phase), Cloud (AWS/Azure/GCP), Mobile (Android/iOS), Wireless, Social Engineer, Exploit Chain, PoC Validator, and Detection Rule generation.
Connects to Claude Desktop, Cursor, VS Code Copilot, Roo Code, or any MCP-compatible client. 15 tool endpoints for engagements, findings, chains, reports, and detection rules.
SQLite-backed storage survives across sessions. Tracks engagements, findings, attack chains, detection rules, and tool results with complex queries for chain discovery.
Every offensive technique gets a corresponding detection rule. Auto-generates Sigma, Splunk SPL, and Elastic KQL rules for blue teams.
Markdown reports with executive summaries, technical findings sorted by severity, attack chains with step-by-step paths, PoCs, remediation guidance, and detection rules.
YAML + .env configuration for LLM provider, model, agent behavior, database, and report settings. Human-in-the-loop mode with approval gates.
Plain Markdown files you drop into any Claude Code project. No dependencies, no build tools, no infrastructure. Describe your task and Claude routes to the right agent automatically.
engagement-planner, osint-collector, recon-advisor [T2], exploit-guide, privesc-advisor, cloud-security, api-security, mobile-pentester, wireless-pentester, social-engineer, vuln-scanner [T2], web-hunter [T2], credential-tester, attack-planner, bug-bounty, ad-attacker [T2], exploit-chainer [T2]. Tier 2 agents execute tools directly.
detection-engineer (Sigma/SPL/KQL rules), threat-modeler (STRIDE/DREAD), forensics-analyst (memory/disk analysis), malware-analyst (reverse engineering, YARA), stig-analyst (DISA STIG compliance).
report-generator, poc-validator [T2], swarm-orchestrator, bizlogic-hunter [T2], cicd-redteam, ctf-solver. Professional reports, swarm coordination, business logic testing, CI/CD integration, and CTF solving.
Claude reads each agent's description and routes your task to the right specialist automatically. "Scan 10.10.1.0/24" goes to recon-advisor. "Write a Sigma rule for DCSync" goes to detection-engineer.
6 Tier 2 agents execute tools directly, but every command goes through Claude Code's permission prompt first. You see the full command and approve or deny it.
Every technique is cross-referenced with ATT&CK IDs. Know exactly where each finding sits in the adversary framework. Maps offensive methodology to defensive detection.
The attack-planner correlates findings from all agents into scored multi-step attack paths. See the full chain from initial access to domain admin with stealth scoring and failure fallbacks.
The bizlogic-hunter finds price manipulation, workflow bypasses, race conditions, and authorization logic flaws that standard scanners completely miss.
The cicd-redteam agent generates ready-to-use pipeline configs for GitHub Actions, GitLab CI, and Jenkins. 3-tier scanning with configurable security gates.
Both are free. Both are open source. They serve different needs.
| Feature | pentest-ai (MCP) | pentest-ai-agents |
|---|---|---|
| Security Tools | ✓ 150+ with parsers | — Advisory only (6 T2 execute) |
| AI Client Support | ✓ Claude, GPT, Copilot, any MCP | Claude Code only |
| Exploit Chaining | ✓ 6 chain templates, autonomous | ✓ Manual via attack-planner |
| PoC Validation | ✓ Automated, safe | ✓ Via poc-validator agent |
| Findings Database | ✓ Persistent SQLite | — Session-only |
| Detection Rules | ✓ Auto-generated (Sigma/SPL/KQL) | ✓ Via detection-engineer |
| Setup Required | Python venv + tool installation | ✓ Zero — just Markdown |
| Dependencies | 128 Python packages | ✓ None |
| Best For | Full autonomous pentesting platform | Quick engagements, learning, Claude Code users |
| License | MIT | MIT |
| Price | Free | Free |
Everything you need to know about both projects.
Both projects are free, open source, and ready to go. Pick one or use both.