NmapMCP
Integrates the Nmap network scanning tool with MCP, enabling network scanning capabilities within MCP-compatible environments.
NmapMCP
NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments. This project allows users to perform various network scans, such as top ports scanning, DNS brute force, and more, directly through MCP interfaces.
Features
-
Top Ports Scanning: Quickly identify the most commonly used ports on target hosts to assess potential entry points.
-
DNS Brute Force: Discover subdomains associated with a target domain, aiding in comprehensive domain mapping.
-
List Scan: Obtain a list of active hosts within a specified range without port scanning, useful for network inventory.
-
OS Detection: Determine the operating system of a target host by analyzing network responses, assisting in vulnerability assessment.
-
Version Detection: Identify service versions running on open ports to detect outdated or vulnerable services.
-
FIN Scan: Perform stealthy scans by sending FIN packets to detect open ports without establishing a full connection.
-
Idle Scan: Conduct highly stealthy scans by leveraging idle hosts to probe target systems, minimizing detection risks.
-
Ping Scan: Detect active hosts in a network by sending ICMP echo requests, useful for network mapping.
-
SYN Scan: Perform half-open TCP scans to identify open ports without completing the TCP handshake, reducing detection likelihood.
-
TCP Connect Scan: Establish full TCP connections to probe open ports, useful when SYN scans are not feasible.
-
UDP Scan: Identify open UDP ports on a target host to detect services that do not use TCP.
-
Port Scan Only: Focus solely on scanning ports without additional host discovery, streamlining the scanning process.
-
No Port Scan: Perform host discovery without scanning ports, useful for identifying live hosts without probing services.
-
ARP Discovery: Identify active devices within a local network segment using ARP requests, effective in LAN environments.
-
Disable DNS Resolution: Perform scans without resolving IP addresses to hostnames, enhancing scan speed and reducing DNS query traffic.
Installation
Installing via Smithery
To install Nmap Integration for Claude Desktop automatically via Smithery:
npx -y @smithery/cli install @0xPratikPatil/nmapmcp --client claude
Manual Installation
-
Clone the Repository:
git clone https://github.com/0xPratikPatil/NmapMCP.git cd NmapMCP -
Install
uv:curl -LsSf https://astral.sh/uv/install.sh | sh -
Create environment:
uv venv -
Install dependencies from
pyproject.tomluv pip installor
uv pip install -r pyproject.toml
Configuration
To configure the Nmap MCP Server, edit the claude_desktop_config.json file located in the project root. This file allows you to set default scan arguments, define MCP tool behaviors, and adjust logging settings.
Example claude_desktop_config.json:
{
"mcpServers": {
"NmapMCP": {
"command": "uv",
"args": [
"--directory",
"/path/to/NmapMCP",
"run",
"main.py"
]
}
}
}
Contributing
Contributions are welcome! To contribute:
-
Fork the Repository: Click the "Fork" button at the top right of the repository page.
-
Clone Your Fork:
git clone https://github.com/0xPratikPatil/NmapMCP.git -
Create a New Branch:
git checkout -b feature/your-feature-name -
Make Your Changes: Implement your feature or fix.
-
Run Tests: Ensure all tests pass.
-
Commit Changes:
git commit -m "Add feature: your feature name" -
Push to Your Fork:
git push origin feature/your-feature-name -
Submit a Pull Request: Navigate to the original repository and click "New Pull Request."
License
This project is licensed under the MIT License.
Acknowledgments
Special thanks to the Nmap and MCP communities for their invaluable tools and support.
Servidores relacionados
Alpha Vantage MCP Server
patrocinadorAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
Jules
Jules async coding agent - run autonomous tasks using Jules
Ilograph MCP Server
Create and validate Ilograph diagrams with access to documentation and guidance.
Tuteliq
AI-powered safety tools for detecting grooming, bullying, threats, and harmful interactions in conversations. The server integrates Tuteliq’s behavioral risk detection API via the Model Context Protocol (MCP), enabling AI assistants to analyze interaction patterns rather than relying on keyword moderation. Use cases include platform safety, chat moderation, child protection, and compliance with regulations such as the EU Digital Services Act (DSA), COPPA, and KOSA.
OpenZipline MCP
Provides secure, standards-compliant smart contract templates for tokens, access control, finance, and governance.
Icons8 MCP server
Get access to MCP server SVG and MCP server PNG icons in your vibe-coding projects
MCP Playground
A demonstration MCP server implementation in Go featuring real-time bidirectional file communication.
MCP Framework
A TypeScript framework for building Model Context Protocol (MCP) servers.
PocketLantern
Blocker-aware decision layer for AI coding agents. Adds source-linked, time-sensitive blockers to AI technical choices — breaking changes, EOLs, lock-in, pricing shifts, and migration risk.
Chrome Debug MCP
This MCP allows you to record browser interactions with a chrome extension that include screenshots and console logs. The data is then saved to a local database that feeds the data to an AI system like claude code to search.
BloodHound-MCP
integration that connects BloodHound with AI through MCP, allowing security professionals to analyze Active Directory attack paths using natural language queries instead of Cypher.