A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
Overview
What is ExternalAttacker MCP?
ExternalAttacker MCP is a Model Context Protocol (MCP) server designed for automated external attack surface management and reconnaissance, utilizing natural language processing to facilitate scanning and vulnerability discovery.
How to use ExternalAttacker MCP?
To use ExternalAttacker MCP, clone the repository from GitHub, install the necessary dependencies, and run the server. You can then issue commands in plain English to perform various scans.
Key features of ExternalAttacker MCP?
- Natural language interface for running scans
- Comprehensive scanning capabilities including subdomain discovery, port scanning, HTTP analysis, CDN detection, TLS analysis, directory fuzzing, and DNS enumeration.
Use cases of ExternalAttacker MCP?
- Scanning domains for subdomains and vulnerabilities.
- Analyzing open ports on network devices.
- Checking SSL configurations and CDN usage for websites.
- Fuzzing endpoints to discover hidden resources.
FAQ from ExternalAttacker MCP?
- Can I use ExternalAttacker MCP on any domain?
Yes, but only on systems you have permission to test.
- What are the prerequisites for using ExternalAttacker MCP?
You need Python 3.8 or higher and Go installed to set up the required tools.
- Is there a community for support?
Yes, you can join the Telegram channel for updates and discussions.
Server Config
{
"mcpServers": {
"ExternalAttacker-MCP": {
"command": "python",
"args": [
"<Your_Path>\\ExternalAttacker-MCP.py"
]
}
}
}