I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

NMAP-MCPSERVER
Dies ist ein MCP -Server (Model Control Protocol), der Zugriff auf NMAP -Netzwerk -Scan -Funktionalität bietet.
3 years
Works with Finder
1
Github Watches
1
Github Forks
2
Github Stars
Nmap MCP Server
This is a Model Control Protocol (MCP) server that provides access to nmap network scanning functionality.
Features
- Run nmap scans on specified targets with customizable options
- Store and retrieve scan results
- Analyze scan results using AI prompts
Installation
Requirements:
- Python 3.10+
- python-libnmap
- nmap (installed on the system)
pip install python-libnmap
Make sure nmap is installed on your system:
# On Debian/Ubuntu
sudo apt-get install nmap
# On Fedora/CentOS
sudo dnf install nmap
Usage
Running the Server
To run the server directly from the source code:
python -m src.nmap_mcp
To install the package and run as a command:
pip install -e .
nmap-mcp
Available Tools
-
run-nmap-scan
- Run an nmap scan on specified targets
- Parameters:
-
target
: Target host or network (e.g., 192.168.1.1 or 192.168.1.0/24) -
options
: Nmap options (e.g., -sV -p 1-1000)
-
-
get-scan-details
- Get detailed information about a specific scan
- Parameters:
-
scan_id
: ID of the scan to retrieve
-
-
list-all-scans
- List all available scan results
- No parameters required
Available Prompts
-
analyze-scan
- Analyze an nmap scan result
- Parameters:
-
scan_id
: ID of the scan to analyze -
focus
: Focus area (security/services/overview)
-
Resources
Scan results are available as resources with the nmap://scan/{scan_id}
URI scheme.
Example Workflow
-
Run a scan:
Call tool: run-nmap-scan Parameters: {"target": "192.168.1.0/24", "options": "-sV -p 22,80,443"}
-
Get scan details:
Call tool: get-scan-details Parameters: {"scan_id": "<scan_id from previous step>"}
-
List all scans:
Call tool: list-all-scans
-
Analyze scan results:
Get prompt: analyze-scan Parameters: {"scan_id": "<scan_id>", "focus": "security"}
Security Considerations
This server executes nmap commands on your system. Be cautious when scanning networks you don't own or have permission to scan, as unauthorized scanning may be illegal in some jurisdictions.
Troubleshooting
If you encounter errors related to nmap not being found or being executed incorrectly:
- Make sure nmap is installed and available in your PATH
- Check the logs for which nmap executable is being used
- The server will attempt to use the full path to nmap to avoid conflicts
相关推荐
Confidential guide on numerology and astrology, based of GG33 Public information
Converts Figma frames into front-end code for various mobile frameworks.
Advanced software engineer GPT that excels through nailing the basics.
Entdecken Sie die umfassendste und aktuellste Sammlung von MCP-Servern auf dem Markt. Dieses Repository dient als zentraler Hub und bietet einen umfangreichen Katalog von Open-Source- und Proprietary MCP-Servern mit Funktionen, Dokumentationslinks und Mitwirkenden.
Ein einheitliches API-Gateway zur Integration mehrerer Ethercan-ähnlicher Blockchain-Explorer-APIs mit Modellkontextprotokoll (MCP) für AI-Assistenten.
Mirror ofhttps: //github.com/suhail-ak-s/mcp-typense-server
本项目是一个钉钉 MCP (Message Connector Protocol )服务 , 提供了与钉钉企业应用交互的 api 接口。项目基于 Go 语言开发 , 支持员工信息查询和消息发送等功能。
Reviews

user_Q1YUVe3T
As a dedicated user of the MCP application, I find nmap-mcpserver by imjdl to be an invaluable tool. Its seamless integration and efficiency in network scanning make it a standout. Whether you are a seasoned professional or a newcomer, this tool greatly enhances productivity. Highly recommended for anyone serious about network management. Check it out at https://github.com/imjdl/nmap-mcpserver.