MCP Catalogs
Home

ExternalAttacker-MCP

by MorDavid·76·Score 39

ExternalAttacker-MCP provides automated attack surface mapping tools integrated through Model Context Protocol for security reconnaissance.

securitydeveloper-tools
17
Forks
0
Open issues
14 mo ago
Last commit
2d ago
Indexed

Overview

ExternalAttacker-MCP is a Python-based MCP server that exposes a comprehensive suite of security reconnaissance tools through natural language queries. It integrates multiple open-source security tools including subfinder for subdomain discovery, naabu for port scanning, httpx for HTTP analysis, and various other utilities for CDN detection, TLS analysis, directory fuzzing, and DNS enumeration. The server converts natural language commands into automated scanning workflows, making security reconnaissance accessible through AI interfaces.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Automated external attack surface mapping for security teams
you:Bug bounty reconnaissance using natural language queries
you:Vulnerability assessment through AI-powered scanning workflows
you:What tools are integrated into ExternalAttacker-MCP?
you:How do I use the MCP server?

When to choose this

Choose this server for security reconnaissance and external attack surface mapping when you need to use natural language commands to automate security assessments.

When NOT to choose this

Avoid this tool if you need to scan systems without explicit permission, require internal network scanning capabilities, or need integration with other security workflows.

Tools this server exposes

7 tools extracted from the README
  • subdomain_discovery

    Discover subdomains of a target domain

  • port_scanning

    Scan for open ports on a target IP or domain

  • http_analysis

    Analyze HTTP services on a target

  • cdn_detection

    Check if a domain uses a CDN service

  • tls_analysis

    Analyze SSL/TLS configuration of a target

  • directory_fuzzing

    Fuzz directories on a web server

  • dns_enumeration

    Perform DNS enumeration on a target domain

Note: Tool names inferred from the scanning categories listed in the Features section, but the exact MCP tool names are not explicitly documented.

Comparable tools

nmap-mcpsubfinder-mcphttpx-mcprecon-mcp

Installation

  1. Clone the repository: git clone https://github.com/mordavid/ExternalAttacker-MCP.git && cd ExternalAttacker
  2. Install Python dependencies: pip install -r requirements.txt
  3. Install required Go tools (subfinder, naabu, httpx, cdncheck, tlsx, ffuf, gobuster, dnsx)
  4. Run the application: python ExternalAttacker-App.py (access at http://localhost:6991)
  5. Configure your MCP client with:
"mcpServers": {
    "ExternalAttacker-MCP": {
        "command": "python",
        "args": [
            "<Your_Path>\\ExternalAttacker-MCP.py"
        ]
    }
}```

FAQ

What tools are integrated into ExternalAttacker-MCP?
ExternalAttacker-MCP integrates subfinder (subdomain discovery), naabu (port scanning), httpx (HTTP analysis), cdncheck (CDN detection), tlsx (TLS analysis), ffuf and gobuster (directory fuzzing), and dnsx (DNS enumeration).
How do I use the MCP server?
After installation and configuration, you can use natural language queries such as 'Scan example.com for subdomains' or 'Check open ports on 192.168.1.1' through your MCP client interface.

Compare ExternalAttacker-MCP with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.