ExternalAttacker-MCP
by MorDavid·★ 76·Score 39
ExternalAttacker-MCP provides automated attack surface mapping tools integrated through Model Context Protocol for security reconnaissance.
Overview
ExternalAttacker-MCP is a Python-based MCP server that exposes a comprehensive suite of security reconnaissance tools through natural language queries. It integrates multiple open-source security tools including subfinder for subdomain discovery, naabu for port scanning, httpx for HTTP analysis, and various other utilities for CDN detection, TLS analysis, directory fuzzing, and DNS enumeration. The server converts natural language commands into automated scanning workflows, making security reconnaissance accessible through AI interfaces.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose this server for security reconnaissance and external attack surface mapping when you need to use natural language commands to automate security assessments.
When NOT to choose this
Avoid this tool if you need to scan systems without explicit permission, require internal network scanning capabilities, or need integration with other security workflows.
Tools this server exposes
7 tools extracted from the READMEsubdomain_discoveryDiscover subdomains of a target domain
port_scanningScan for open ports on a target IP or domain
http_analysisAnalyze HTTP services on a target
cdn_detectionCheck if a domain uses a CDN service
tls_analysisAnalyze SSL/TLS configuration of a target
directory_fuzzingFuzz directories on a web server
dns_enumerationPerform DNS enumeration on a target domain
Note: Tool names inferred from the scanning categories listed in the Features section, but the exact MCP tool names are not explicitly documented.
Comparable tools
Installation
- Clone the repository:
git clone https://github.com/mordavid/ExternalAttacker-MCP.git && cd ExternalAttacker - Install Python dependencies:
pip install -r requirements.txt - Install required Go tools (subfinder, naabu, httpx, cdncheck, tlsx, ffuf, gobuster, dnsx)
- Run the application:
python ExternalAttacker-App.py(access at http://localhost:6991) - Configure your MCP client with:
"mcpServers": {
"ExternalAttacker-MCP": {
"command": "python",
"args": [
"<Your_Path>\\ExternalAttacker-MCP.py"
]
}
}```FAQ
- What tools are integrated into ExternalAttacker-MCP?
- ExternalAttacker-MCP integrates subfinder (subdomain discovery), naabu (port scanning), httpx (HTTP analysis), cdncheck (CDN detection), tlsx (TLS analysis), ffuf and gobuster (directory fuzzing), and dnsx (DNS enumeration).
- How do I use the MCP server?
- After installation and configuration, you can use natural language queries such as 'Scan example.com for subdomains' or 'Check open ports on 192.168.1.1' through your MCP client interface.
Compare ExternalAttacker-MCP with
Last updated · Auto-generated from public README + GitHub signals.