https://github.com/mordavid/externalattacker-mcp
A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
https://github.com/mordavid/externalattacker-mcp
bug-bounty bugbounty bugbounty-tool dnsx externalattacker gobuster httpx mcp mcp-server nuclei nuclei-templates projectdiscovery tlsx
Last synced: about 2 months ago
JSON representation
A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
- Host: GitHub
- URL: https://github.com/mordavid/externalattacker-mcp
- Owner: MorDavid
- Created: 2025-04-06T19:56:11.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2025-04-06T20:48:36.000Z (2 months ago)
- Last Synced: 2025-04-12T03:58:59.258Z (about 2 months ago)
- Topics: bug-bounty, bugbounty, bugbounty-tool, dnsx, externalattacker, gobuster, httpx, mcp, mcp-server, nuclei, nuclei-templates, projectdiscovery, tlsx
- Language: Python
- Homepage: https://www.MORDAVID.com
- Size: 917 KB
- Stars: 18
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
# ExternalAttacker MCP Server

## Model Context Protocol (MCP) Server for External Attack Surface Management
ExternalAttacker is a powerful integration that brings automated scanning capabilities with natural language interface for comprehensive external attack surface management and reconnaissance.
> 🔍 **Automated Attack Surface Management with AI!**
> Scan domains, analyze infrastructure, and discover vulnerabilities using natural language.## 🔍 What is ExternalAttacker?
ExternalAttacker combines the power of:
* **Automated Scanning**: Comprehensive toolset for external reconnaissance
* **Model Context Protocol (MCP)**: An open protocol for creating custom AI tools
* **Natural Language Processing**: Convert plain English queries into scanning commands## 📱 Community
Join our Telegram channel for updates, tips, and discussion:
- **Telegram**: [https://t.me/root_sec](https://t.me/root_sec)## ✨ Features
* **Natural Language Interface**: Run scans using plain English
* **Comprehensive Scanning Categories**:
* 🌐 Subdomain Discovery (subfinder)
* 🔢 Port Scanning (naabu)
* 🌍 HTTP Analysis (httpx)
* 🛡️ CDN Detection (cdncheck)
* 🔐 TLS Analysis (tlsx)
* 📁 Directory Fuzzing (ffuf, gobuster)
* 📝 DNS Enumeration (dnsx)## 📋 Prerequisites
* Python 3.8 or higher
* Go (for installing tools)
* MCP Client## 🔧 Installation
1. Clone this repository:
```bash
git clone https://github.com/mordavid/ExternalAttacker-MCP.git
cd ExternalAttacker
```2. Install Python dependencies:
```bash
pip install -r requirements.txt
```3. Install required Go tools:
```bash
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/naabu/v2/cmd/naabu@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
go install -v github.com/projectdiscovery/cdncheck/cmd/cdncheck@latest
go install -v github.com/projectdiscovery/tlsx/cmd/tlsx@latest
go install -v github.com/ffuf/ffuf@latest
go install github.com/OJ/gobuster/v3@latest
go install -v github.com/projectdiscovery/dnsx/cmd/dnsx@latest
```4. Run ExternalAttacker-App.py
```bash
python ExternalAttacker-App.py
# Access http://localhost:6991
```5. Configure the MCP Server
```bash
"mcpServers": {
"ExternalAttacker-MCP": {
"command": "python",
"args": [
"\\ExternalAttacker-MCP.py"
]
}
}
```## 🚀 Usage
Example queries you can ask through the MCP:
* "Scan example.com for subdomains"
* "Check open ports on 192.168.1.1"
* "Analyze HTTP services on test.com"
* "Check if domain.com uses a CDN"
* "Analyze SSL configuration of site.com"
* "Fuzz endpoints on target.com"## 📜 License
MIT License
## 🙏 Acknowledgments
* The ProjectDiscovery team for their excellent security tools
* The MCP community for advancing AI-powered tooling---
_Note: This is a security tool. Please use responsibly and only on systems you have permission to test._