NH

NetHunter Pro

Ghost Protocol v2.0

AI ONLINE

Authorization Required

This tool is designed for authorized security assessments only. Always obtain proper written authorization before conducting any penetration testing. Unauthorized access to computer systems is illegal under the CFAA, CMA, and equivalent laws worldwide.

Model Context Protocol

MCP Integration Hub

5/5 servers connected — 16 tools available

Filesystem MCP

CONNECTED

AI reads/writes scan results, configs, wordlists, and reports directly on the device

toolsresourcesstdio6 tools

Brave Search MCP

CONNECTED

Real-time OSINT, CVE lookups, exploit searches, and threat intelligence via Brave Search API

toolsstdio2 tools

Fetch MCP

CONNECTED

AI autonomously retrieves exploit databases, threat feeds, API endpoints, and web content

toolsstdio1 tools

Memory MCP

CONNECTED

Persistent knowledge graph of targets, vulnerabilities, credentials, and attack paths

toolsstdio6 tools

Sequential Thinking MCP

CONNECTED

AI breaks complex attack chains into structured reasoning steps with revision capability

toolsstdio1 tools