NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments
Overview
what is NmapMCP?
NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments.
how to use NmapMCP?
To use NmapMCP, clone the repository, install the necessary dependencies, and configure the server settings in the claude_desktop_config.json file. Then, run the server using the command uv --directory /path/to/NmapMCP run main.py.
key features of NmapMCP?
- Top Ports Scanning
- DNS Brute Force
- List Scan
- OS Detection
- Version Detection
- FIN Scan
- Idle Scan
- Ping Scan
- SYN Scan
- TCP Connect Scan
- UDP Scan
- ARP Discovery
- Disable DNS Resolution
use cases of NmapMCP?
- Identifying potential entry points in a network.
- Mapping subdomains for a target domain.
- Conducting stealthy network scans to assess vulnerabilities.
- Inventorying active hosts in a network.
FAQ from NmapMCP?
- Can NmapMCP perform all types of network scans?
Yes! NmapMCP supports a wide range of scanning techniques including TCP, UDP, and stealth scans.
- Is NmapMCP easy to install?
Yes! Installation involves cloning the repository and running a few commands to set up the environment.
- What is the purpose of the
claude_desktop_config.jsonfile?
This file allows users to configure default scan arguments and tool behaviors for the Nmap MCP Server.
Server Config
{
"mcpServers": {
"NmapMCP": {
"command": "uv",
"args": [
"--directory",
"/path/to/NmapMCP",
"run",
"main.py"
]
}
}
}