Submit

NmapMCP

@0xPratikPatil

NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments
Overview

what is NmapMCP?

NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments.

how to use NmapMCP?

To use NmapMCP, clone the repository, install the necessary dependencies, and configure the server settings in the claude_desktop_config.json file. Then, run the server using the command uv --directory /path/to/NmapMCP run main.py.

key features of NmapMCP?

  • Top Ports Scanning
  • DNS Brute Force
  • List Scan
  • OS Detection
  • Version Detection
  • FIN Scan
  • Idle Scan
  • Ping Scan
  • SYN Scan
  • TCP Connect Scan
  • UDP Scan
  • ARP Discovery
  • Disable DNS Resolution

use cases of NmapMCP?

  1. Identifying potential entry points in a network.
  2. Mapping subdomains for a target domain.
  3. Conducting stealthy network scans to assess vulnerabilities.
  4. Inventorying active hosts in a network.

FAQ from NmapMCP?

  • Can NmapMCP perform all types of network scans?

Yes! NmapMCP supports a wide range of scanning techniques including TCP, UDP, and stealth scans.

  • Is NmapMCP easy to install?

Yes! Installation involves cloning the repository and running a few commands to set up the environment.

  • What is the purpose of the claude_desktop_config.json file?

This file allows users to configure default scan arguments and tool behaviors for the Nmap MCP Server.

Server Config

{
  "mcpServers": {
    "NmapMCP": {
      "command": "uv",
      "args": [
        "--directory",
        "/path/to/NmapMCP",
        "run",
        "main.py"
      ]
    }
  }
}
© 2025 MCP.so. All rights reserved.

Build with ShipAny.