MCP cover image

Un outil de cartographie modulaire de surface d'attaque externe intégrant des outils pour les flux de travail automatisés de reconnaissance et de prime de bug.

1

Github Watches

7

Github Forks

25

Github Stars

ExternalAttacker MCP Server

ExternalAttacker-MCP

Model Context Protocol (MCP) Server for External Attack Surface Management

ExternalAttacker is a powerful integration that brings automated scanning capabilities with natural language interface for comprehensive external attack surface management and reconnaissance.

🔍 Automated Attack Surface Management with AI!
Scan domains, analyze infrastructure, and discover vulnerabilities using natural language.

🔍 What is ExternalAttacker?

ExternalAttacker combines the power of:

  • Automated Scanning: Comprehensive toolset for external reconnaissance
  • Model Context Protocol (MCP): An open protocol for creating custom AI tools
  • Natural Language Processing: Convert plain English queries into scanning commands

📱 Community

Join our Telegram channel for updates, tips, and discussion:

✨ Features

  • Natural Language Interface: Run scans using plain English
  • Comprehensive Scanning Categories:
    • 🌐 Subdomain Discovery (subfinder)
    • 🔢 Port Scanning (naabu)
    • 🌍 HTTP Analysis (httpx)
    • 🛡️ CDN Detection (cdncheck)
    • 🔐 TLS Analysis (tlsx)
    • 📁 Directory Fuzzing (ffuf, gobuster)
    • 📝 DNS Enumeration (dnsx)

📋 Prerequisites

  • Python 3.8 or higher
  • Go (for installing tools)
  • MCP Client

🔧 Installation

  1. Clone this repository:

    git clone https://github.com/mordavid/ExternalAttacker-MCP.git
    cd ExternalAttacker
    
  2. Install Python dependencies:

    pip install -r requirements.txt
    
  3. Install required Go tools:

    go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
    go install -v github.com/projectdiscovery/naabu/v2/cmd/naabu@latest
    go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
    go install -v github.com/projectdiscovery/cdncheck/cmd/cdncheck@latest
    go install -v github.com/projectdiscovery/tlsx/cmd/tlsx@latest
    go install -v github.com/ffuf/ffuf@latest
    go install github.com/OJ/gobuster/v3@latest
    go install -v github.com/projectdiscovery/dnsx/cmd/dnsx@latest
    
  4. Run ExternalAttacker-App.py

    python ExternalAttacker-App.py
    # Access http://localhost:6991
    
  5. Configure the MCP Server

    "mcpServers": {
        "ExternalAttacker-MCP": {
            "command": "python",
            "args": [
                "<Your_Path>\\ExternalAttacker-MCP.py"
            ]
        }
    }
    

🚀 Usage

Example queries you can ask through the MCP:

  • "Scan example.com for subdomains"
  • "Check open ports on 192.168.1.1"
  • "Analyze HTTP services on test.com"
  • "Check if domain.com uses a CDN"
  • "Analyze SSL configuration of site.com"
  • "Fuzz endpoints on target.com"

📜 License

MIT License

🙏 Acknowledgments

  • The ProjectDiscovery team for their excellent security tools
  • The MCP community for advancing AI-powered tooling

Note: This is a security tool. Please use responsibly and only on systems you have permission to test.

相关推荐

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • lumpenspace
  • Take an adjectivised noun, and create images making it progressively more adjective!

  • https://appia.in
  • Siri Shortcut Finder – your go-to place for discovering amazing Siri Shortcuts with ease

  • apappascs
  • Découvrez la collection la plus complète et la plus à jour de serveurs MCP sur le marché. Ce référentiel sert de centre centralisé, offrant un vaste catalogue de serveurs MCP open-source et propriétaires, avec des fonctionnalités, des liens de documentation et des contributeurs.

  • ShrimpingIt
  • Manipulation basée sur Micropython I2C de l'exposition GPIO de la série MCP, dérivée d'Adafruit_MCP230XX

  • modelcontextprotocol
  • Serveurs de protocole de contexte modèle

  • jae-jae
  • MCP Server pour récupérer le contenu de la page Web à l'aide du navigateur sans tête du dramwright.

  • Mintplex-Labs
  • L'application tout-en-un desktop et Docker AI avec chiffon intégré, agents AI, constructeur d'agent sans code, compatibilité MCP, etc.

  • ravitemer
  • Un puissant plugin Neovim pour gérer les serveurs MCP (Protocole de contexte modèle)

  • patruff
  • Pont entre les serveurs Olllama et MCP, permettant aux LLM locaux d'utiliser des outils de protocole de contexte de modèle

  • pontusab
  • La communauté du curseur et de la planche à voile, recherchez des règles et des MCP

  • WangRongsheng
  • 🧑‍🚀 全世界最好的 LLM 资料总结 (数据处理、模型训练、模型部署、 O1 模型、 MCP 、小语言模型、视觉语言模型) | Résumé des meilleures ressources LLM du monde.

    Reviews

    5 (1)
    Avatar
    user_lEURjRFz
    2025-04-17

    I've been using ExternalAttacker-MCP by MorDavid and it's truly impressive. The tool is well-crafted, delivering excellent performance in external attack simulations. The documentation is clear, and the welcome info gets you started quickly. Great job, MorDavid! Highly recommend checking it out: [ExternalAttacker-MCP](https://github.com/MorDavid/ExternalAttacker-MCP).