7 tools from the HackTricks MCP Server MCP Server, categorised by risk level.
View the HackTricks MCP Server policy →get_hacktricks_cheatsheet Extract ALL CODE BLOCKS from a page (commands, payloads, scripts, one-liners). Skips explanatory text. Perfect for: 'give me the exploit command', ... 2/5 get_hacktricks_outline Get TABLE OF CONTENTS (all section headers) of a page. Returns ~20-50 lines showing page structure. Use this FIRST after search to: (1) verify page... 2/5 get_hacktricks_page Get FULL page content. ⚠️ EXPENSIVE: Pages average 3000-15000 tokens. PREFER: get_hacktricks_section for specific topics, get_hacktricks_cheatsheet... 2/5 get_hacktricks_section Extract ONE SECTION from a page. MOST EFFICIENT way to read content. Typical sections: 'Exploitation', 'Enumeration', 'Prevention', 'Example', 'Pay... 2/5 hacktricks_quick_lookup ⚡ ONE-SHOT exploitation lookup. Searches, finds best page, and returns exploitation sections + code blocks. Use for: 'how do I exploit X', 'give me... list_hacktricks_categories Browse HackTricks structure. Without params: list all categories. With category: show all pages in that category. Use when: (1) unsure which catego... search_hacktricks Search HackTricks for pentesting techniques, exploits, and security info. Returns results GROUPED BY FILE with: page title, match count, relevant s... 2/5 The HackTricks MCP Server MCP server exposes 7 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the HackTricks MCP Server server.
HackTricks MCP Server tools are categorised as Read (7). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept