MCP cover image
See in Github
2025-03-25

Il s'agit d'un serveur de protocole de contrôle de modèle (MCP) qui donne accès aux fonctionnalités de numérisation du réseau NMAP.

1

Github Watches

1

Github Forks

2

Github Stars

Nmap MCP Server

This is a Model Control Protocol (MCP) server that provides access to nmap network scanning functionality.

Features

  • Run nmap scans on specified targets with customizable options
  • Store and retrieve scan results
  • Analyze scan results using AI prompts

Installation

Requirements:

  • Python 3.10+
  • python-libnmap
  • nmap (installed on the system)
pip install python-libnmap

Make sure nmap is installed on your system:

# On Debian/Ubuntu
sudo apt-get install nmap

# On Fedora/CentOS
sudo dnf install nmap

Usage

Running the Server

To run the server directly from the source code:

python -m src.nmap_mcp

To install the package and run as a command:

pip install -e .
nmap-mcp

Available Tools

  1. run-nmap-scan

    • Run an nmap scan on specified targets
    • Parameters:
      • target: Target host or network (e.g., 192.168.1.1 or 192.168.1.0/24)
      • options: Nmap options (e.g., -sV -p 1-1000)
  2. get-scan-details

    • Get detailed information about a specific scan
    • Parameters:
      • scan_id: ID of the scan to retrieve
  3. list-all-scans

    • List all available scan results
    • No parameters required

Available Prompts

  1. analyze-scan
    • Analyze an nmap scan result
    • Parameters:
      • scan_id: ID of the scan to analyze
      • focus: Focus area (security/services/overview)

Resources

Scan results are available as resources with the nmap://scan/{scan_id} URI scheme.

Example Workflow

  1. Run a scan:

    Call tool: run-nmap-scan
    Parameters: {"target": "192.168.1.0/24", "options": "-sV -p 22,80,443"}
    
  2. Get scan details:

    Call tool: get-scan-details
    Parameters: {"scan_id": "<scan_id from previous step>"}
    
  3. List all scans:

    Call tool: list-all-scans
    
  4. Analyze scan results:

    Get prompt: analyze-scan
    Parameters: {"scan_id": "<scan_id>", "focus": "security"}
    

Security Considerations

This server executes nmap commands on your system. Be cautious when scanning networks you don't own or have permission to scan, as unauthorized scanning may be illegal in some jurisdictions.

Troubleshooting

If you encounter errors related to nmap not being found or being executed incorrectly:

  1. Make sure nmap is installed and available in your PATH
  2. Check the logs for which nmap executable is being used
  3. The server will attempt to use the full path to nmap to avoid conflicts

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • Contraband Interactive
  • Emulating Dr. Jordan B. Peterson's style in providing life advice and insights.

  • rustassistant.com
  • Your go-to expert in the Rust ecosystem, specializing in precise code interpretation, up-to-date crate version checking, and in-depth source code analysis. I offer accurate, context-aware insights for all your Rust programming questions.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • apappascs
  • Découvrez la collection la plus complète et la plus à jour de serveurs MCP sur le marché. Ce référentiel sert de centre centralisé, offrant un vaste catalogue de serveurs MCP open-source et propriétaires, avec des fonctionnalités, des liens de documentation et des contributeurs.

  • modelcontextprotocol
  • Serveurs de protocole de contexte modèle

  • Mintplex-Labs
  • L'application tout-en-un desktop et Docker AI avec chiffon intégré, agents AI, constructeur d'agent sans code, compatibilité MCP, etc.

  • ShrimpingIt
  • Manipulation basée sur Micropython I2C de l'exposition GPIO de la série MCP, dérivée d'Adafruit_MCP230XX

  • n8n-io
  • Plateforme d'automatisation de workflow à code équitable avec des capacités d'IA natives. Combinez le bâtiment visuel avec du code personnalisé, de l'auto-hôte ou du cloud, 400+ intégrations.

  • huahuayu
  • Une passerelle API unifiée pour intégrer plusieurs API d'explorateur de blockchain de type étherscan avec la prise en charge du protocole de contexte modèle (MCP) pour les assistants d'IA.

    Reviews

    1 (1)
    Avatar
    user_Q1YUVe3T
    2025-04-16

    As a dedicated user of the MCP application, I find nmap-mcpserver by imjdl to be an invaluable tool. Its seamless integration and efficiency in network scanning make it a standout. Whether you are a seasoned professional or a newcomer, this tool greatly enhances productivity. Highly recommended for anyone serious about network management. Check it out at https://github.com/imjdl/nmap-mcpserver.