world 1st black hat hacker mcp that think studies plans and select optimal attack vector and move forward
| Capability | v3.0 | v3.1 |
|---|---|---|
| Parallel Output | Waits for slowest | Streaming results as each tool finishes (parallel_stream) |
| Auto-routing | Manual decision | smart_parallel auto-selects strategy by tool speed |
| File I/O | Fragile cat EOF shell | Native API: 12 ops unified into file_manager |
| Command Length | 4,096 bytes cap | Large payload support (32,768+ bytes) |
| Server Visuals | Basic standard output | Premium UI: Grid tables, inline findings, color pills |
| Data Extraction | Manual regex by AI | Auto port/URL findings extracted per streaming tool |
smart_parallel and SSE endpoints, receive test results the moment each tool finishes — you no longer wait 60 seconds just because one tool is slow.file_manager tool to optimize LLM performance limit load.| Tool | Function | Description |
|---|---|---|
nmap_scan | Port/service scanning | Target, scan_type, ports, additional_args |
gobuster_scan | Directory/DNS bruteforce | URL, mode (dir/dns/fuzz/vhost), wordlist |
dirb_scan | Directory bruteforce | URL, wordlist, additional_args |
nikto_scan | Web vulnerability scanner | Target, additional_args |
sqlmap_scan | SQL injection testing | URL, data, additional_args |
metasploit_run | Metasploit module execution | Module path, options dict |
hydra_attack | Credential brute force | Target, service, username/file, password/file |
john_crack | Password hash cracking | Hash file, wordlist, format |
wpscan_analyze | WordPress scanner | URL, additional_args |
enum4linux_scan | SMB/NetBIOS enumeration | Target, additional_args |
| Tool | Function | Description |
|---|---|---|
smart_parallel | Auto-Routing Parallel Execution | Intelligently delegates list of commands based on tool length |
parallel_stream | Streaming Fast Returns | Waitless synchronous streaming, fastest tools output returned instantly |
parallel_execute | Synchronous block | Runs everything, waits for slowest |
parallel_execute_async | Fire-and-forget background | Commands list, timeout. Returns job_id |
parallel_watch | Live push feed SSE | Consume instant results as they land in real-time server streams |
| Tool | Function | Description |
|---|---|---|
analyze_and_plan | Real-time target analysis | Target profile, CVE detection, next 15 tools |
get_next_steps | Decision engine suggestions | Priority-scored attack recommendations |
get_findings | Query findings database | Filter by type, limit |
add_finding | Store manual finding | Type, value, source |
| Tool | Function | Description |
|---|---|---|
smart_graph_execute | Conditional task graph | Nodes with port_open/stdout_contains conditions |
execute_task_graph | DAG task execution | Dependency-aware parallel execution |
execute_command | Raw shell command | ⚠️ Requires user confirmation |
discover_tools | System tool scanner | Finds 35+ security tools on PATH |
| Tool | Function | Description |
|---|---|---|
run_workflow | Execute attack recipe | recon / web / smb / full + custom |
get_workflow | Preview workflow steps | See before executing |
list_workflows | Available workflows | Built-in + custom listing |
list_workflow_runs | Execution history | Recent runs with status |
| Tool | Function | Description |
|---|---|---|
dashboard | Live battle overview | Running jobs, findings, recent commands |
server_health | Server status check | Tool availability, DB status, version |
get_workflow_run | Past run details | Full results of a workflow execution |
get_command_log | Audit trail | Command history with stdout/stderr |
| Tool | Function | Description |
|---|---|---|
file_manager | Native Python File Ops | Supports: write, read, update, delete, move, copy, list, info, mkdir, chmod, grep, find. Replaces previous shell scripts format limit and fragilities. |
pip install flask mcp requestsgit clone https://github.com/kishwordulal1234/honey-badger-mcp.git
cd honey-badger-mcp
pip install flask mcp requests# Local only
python3 server.py --port 5253
# Network accessible (for remote AI IDE connection)
python3 server.py --port 5253 --ip 0.0.0.0Honey Badger MCP works with any AI IDE that supports the Model Context Protocol. Below are setup instructions ranked by recommendation.
The best experience — native MCP support with deep tool integration.
Config file: ~/.gemini/antigravity/mcp_config.json
{
"mcpServers": {
"honey_badger_mcp": {
"command": "python3",
"args": [
"/absolute/path/to/honey_badger_mcp/client.py",
"--server",
"http://KALI_IP:5253"
],
"description": "Honey Badger MCP v3.1 — Elite Offensive Security Warfare Engine",
"timeout": 300,
"alwaysAllow": []
}
}
}Example with actual paths:
{
"mcpServers": {
"honey_badger_mcp": {
"command": "python3",
"args": [
"/home/unknonehartr/Desktop/honey_badger_mcp/client.py",
"--server",
"http://192.168.1.8:5253"
],
"description": "Honey Badger MCP v3.1 — Elite Offensive Security Warfare Engine",
"timeout": 300,
"alwaysAllow": []
}
}
}Why #1: Antigravity has the deepest MCP integration, handles 28 tools seamlessly, and supports the parallel execution patterns Honey Badger relies on. The timeout configuration ensures long-running scans (nikto, sqlmap) don't get killed prematurely.
Excellent MCP support with Cascade agent mode.
Config file: ~/.codeium/windsurf/mcp_config.json
{
"mcpServers": {
"honey_badger_mcp": {
"command": "python3",
"args": [
"/absolute/path/to/honey_badger_mcp/client.py",
"--server",
"http://KALI_IP:5253"
]
}
}
}Why #2: Windsurf's Cascade mode handles multi-step tool chains well, making it great for the adaptive learning loop (scan → analyze → plan → execute).
Strong MCP support with agentic capabilities.
Config file: .cursor/mcp.json (in your project root)
{
"mcpServers": {
"honey_badger_mcp": {
"command": "python3",
"args": [
"/absolute/path/to/honey_badger_mcp/client.py",
"--server",
"http://KALI_IP:5253"
]
}
}
}Note: Cursor uses project-level MCP config. Create
.cursor/mcp.jsonin whichever project directory you're working from.
Works well for interactive security analysis.
Config file:
~/Library/Application Support/Claude/claude_desktop_config.json~/.config/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.json{
"mcpServers": {
"honey_badger_mcp": {
"command": "python3",
"args": [
"/absolute/path/to/honey_badger_mcp/client.py",
"--server",
"http://KALI_IP:5253"
]
}
}
}python3 server.py --port 5253 --ip 0.0.0.0curl http://KALI_IP:5253/healthpip install flask mcp requestshoney_badger_mcp/
│
├── server.py # 🏗️ Flask API Execution Engine
│ # ├── Parallel Warfare Engine (50 concurrent threads)
│ # ├── Smart Conditional Graph Executor
│ # ├── Workflow Engine (recon/web/smb/full)
│ # ├── Target Intelligence Analyzer (OS/CMS/DB/CVE)
│ # ├── Deep Decision Engine (25+ service→attack maps)
│ # ├── SQLite Persistent Memory Store
│ # ├── Tool Auto-Discovery (35+ tools)
│ # ├── DAG-Based Task Orchestration
│ # └── REST API (20+ endpoints)
│
├── client.py # 🔗 MCP Client Bridge (FastMCP Protocol)
│ # ├── 28 MCP Tools Exposed
│ # ├── Elite System Prompt
│ # │ ├── Bug Bounty Hunter (15yr)
│ # │ ├── Exploit Developer (20yr)
│ # │ ├── CTF Champion (10yr)
│ # │ ├── Systems Hacker (40yr)
│ # │ └── Red Team Operator (25yr)
│ # ├── KaliToolsClient HTTP Adapter
│ # ├── Real-Time Learning Tools
│ # └── Health Check & Diagnostics
│
├── mcp.json # ⚙️ MCP Configuration Template
│ # └── Ready-to-use config for all AI IDEs
│
├── banner.svg # 🎨 Project Banner Graphic
├── architecture.svg # 📐 Architecture Diagram
│
├── honey_badger.db # 🗄️ SQLite Database (auto-created at runtime)
│ # ├── findings — ports, URLs, IPs, vulns
│ # ├── command_log — full execution audit trail
│ # ├── tasks — DAG task state
│ # ├── parallel_jobs — background job tracking
│ # ├── workflow_runs — workflow execution history
│ # └── smart_graph_runs — conditional graph logs
│
└── workflows/ # 📋 Custom Workflow Definitions (auto-created)
# └── Drop .json or .md workflow files hereAfter every scan wave, analyze_and_plan() performs deep target analysis:
| Port | Service | Auto-launched Tools |
|---|---|---|
| 21 | FTP | nmap ftp-scripts, hydra anonymous check |
| 22 | SSH | nmap ssh-auth-methods, hydra brute force |
| 25 | SMTP | nmap smtp-enum-users, smtp-vuln scripts |
| 53 | DNS | nmap dns-zone-transfer, dig axfr |
| 80 | HTTP | nikto, dirb, gobuster, whatweb |
| 443 | HTTPS | nikto-ssl, sslscan, gobuster-https |
| 445 | SMB | enum4linux, smb-vuln scripts, smbclient |
| 1433 | MSSQL | nmap ms-sql scripts, hydra mssql |
| 3306 | MySQL | nmap mysql scripts, hydra mysql |
| 3389 | RDP | rdp-vuln-ms12-020, hydra rdp |
| 5432 | PostgreSQL | nmap pgsql-brute |
| 5900 | VNC | nmap vnc-info, vnc-brute |
| 6379 | Redis | nmap redis-info |
| 8080 | Alt HTTP | nikto, gobuster |
| 27017 | MongoDB | nmap mongodb-databases |
| Feature | HexStrike | MCP Kali Server | Honey Badger v3.1 |
|---|---|---|---|
| Parallel Execution | ❌ Sequential | ❌ Sequential | ✅ 15-50 simultaneous |
| Target Learning | ❌ None | ❌ None | ✅ Real-time adaptive |
| CVE Detection | ❌ None | ❌ None | ✅ 18+ version→CVE maps |
| Attack Planning | ❌ Manual | ❌ Manual | ✅ Auto 15-tool recommendations |
| Safety Controls | ⚠️ Basic | ❌ None (raw bash) | ✅ Input validation + injection detection |
| Plugin System | ⚠️ Complex | ❌ None | ✅ Simple Python plugins |
| Persistent Memory | ⚠️ Partial | ❌ None | ✅ Full SQLite with dedup |
| MCP Integration | ⚠️ Custom | ✅ Basic | ✅ 28 typed tools via FastMCP |
| Setup Complexity | 🔴 Heavy | 🟡 Medium | 🟢 2 files, pip install |
| Variable | Default | Description |
|---|---|---|
API_PORT | 5000 | Server bind port |
COMMAND_TIMEOUT | 180 | Per-command timeout (seconds) |
HB_DB_PATH | ./honey_badger.db | SQLite database path |
HB_WORKFLOW_DIR | ./workflows | Custom workflow directory |
DEBUG_MODE | 0 | Enable debug logging (1/true) |
python3 server.py [OPTIONS]
--port PORT Server port (default: 5000)
--ip IP Bind address (default: 127.0.0.1, use 0.0.0.0 for network)
--db PATH Override database path
--debug Enable debug logging
--no-discovery Skip tool auto-discovery on startuppython3 client.py [OPTIONS]
--server URL Server URL (default: http://localhost:5000)
--timeout SECONDS Request timeout (default: 300)
--debug Enable debug logging
--no-health-check Skip initial server health checksetsid)python3 --version # Must be 3.10+
pip install flask mcp requests # Install deps
ss -tlnp | grep 5253 # Check port in usesudo chown $USER honey_badger.db # Fix ownership
# OR
export HB_DB_PATH=./my_hb.db && python3 server.py # Custom pathwhich nmap gobuster dirb nikto sqlmap # Verify in PATH
sudo apt install nmap nikto dirb gobuster sqlmap hydra john enum4linux # Install (Kali)curl http://KALI_IP:5253/health # Verify server reachable
# Use ABSOLUTE paths in mcp.json
# Restart your IDE after config changes# Increase timeout in mcp_config.json:
"timeout": 300 # 5 minutes — enough for heavy scans
# OR use async mode for long scans (nikto, sqlmap, full nmap)This project is provided as-is for authorized security testing purposes only. Ensure you have proper, documented authorization before scanning any targets. The authors hold no responsibility for misuse.
"Honey Badger don't care. Honey Badger PWNS." 🦡
kishwordulal1234/honey_badger_mcp
April 3, 2026
April 13, 2026
Python