MCP-Server-Pentest

MCP-Server-Pentest

3.4

If you are the rightful owner of MCP-Server-Pentest and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

MCP Server Pentest is a tool designed for automatic detection of web vulnerabilities and interaction with web pages.

MCP Server Pentest is a comprehensive tool for testing web applications for vulnerabilities such as XSS and SQL injection. It provides features for full browser interaction, including navigation, form filling, and JavaScript execution. The tool is designed to automate the detection of vulnerabilities and provide detailed insights through screenshots and console log monitoring. It is built on top of Playwright, allowing for robust browser automation and testing capabilities. The installation process is straightforward, and the tool integrates seamlessly with existing configurations, making it a valuable asset for security professionals and developers looking to enhance their web application security testing processes.

Features

  • Automatic detection of XSS and SQL vulnerabilities
  • Ability to take screenshots of entire pages or specific elements
  • Comprehensive network interaction including navigation and form filling
  • Console log monitoring for detailed insights
  • JavaScript execution within the browser context

Tools

  1. broser_url_reflected_xss

    Test the URL for XSS vulnerability

  2. browser_url_sql_injection

    Test the URL for SQL injection vulnerability

  3. browser_navigate

    Navigate to any URL in your browser

  4. browser_screenshot

    Capture screenshots of entire page or specific elements

  5. browser_click

    Use the CSS selector to click on an element on the page

  6. browser_click_text

    Click on elements on the page with text content

  7. browser_hover

    Elements hovering on page using CSS selector

  8. browser_hover_text

    Elements hovering over page with text content

  9. browser_fill

    Fill in the input field

  10. browser_select

    Select an option in the SELECT element using the CSS selector

  11. browser_select_text

    Select an option in the SELECT element through text content

  12. browser_evaluate

    Execute JavaScript in the browser console