Cover image
Try Now
2025-03-30

NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments

3 years

Works with Finder

1

Github Watches

0

Github Forks

0

Github Stars

NmapMCP

smithery badge NmapMCP is a robust integration of the Nmap scanning tool with the Model Context Protocol (MCP), enabling seamless network scanning capabilities within MCP-compatible environments. This project allows users to perform various network scans, such as top ports scanning, DNS brute force, and more, directly through MCP interfaces.

Features

  • Top Ports Scanning: Quickly identify the most commonly used ports on target hosts to assess potential entry points.

  • DNS Brute Force: Discover subdomains associated with a target domain, aiding in comprehensive domain mapping.

  • List Scan: Obtain a list of active hosts within a specified range without port scanning, useful for network inventory.

  • OS Detection: Determine the operating system of a target host by analyzing network responses, assisting in vulnerability assessment.

  • Version Detection: Identify service versions running on open ports to detect outdated or vulnerable services.

  • FIN Scan: Perform stealthy scans by sending FIN packets to detect open ports without establishing a full connection.

  • Idle Scan: Conduct highly stealthy scans by leveraging idle hosts to probe target systems, minimizing detection risks.

  • Ping Scan: Detect active hosts in a network by sending ICMP echo requests, useful for network mapping.

  • SYN Scan: Perform half-open TCP scans to identify open ports without completing the TCP handshake, reducing detection likelihood.

  • TCP Connect Scan: Establish full TCP connections to probe open ports, useful when SYN scans are not feasible.

  • UDP Scan: Identify open UDP ports on a target host to detect services that do not use TCP.

  • Port Scan Only: Focus solely on scanning ports without additional host discovery, streamlining the scanning process.

  • No Port Scan: Perform host discovery without scanning ports, useful for identifying live hosts without probing services.

  • ARP Discovery: Identify active devices within a local network segment using ARP requests, effective in LAN environments.

  • Disable DNS Resolution: Perform scans without resolving IP addresses to hostnames, enhancing scan speed and reducing DNS query traffic.

Installation

Installing via Smithery

To install Nmap Integration for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @0xPratikPatil/nmapmcp --client claude

Manual Installation

  1. Clone the Repository:

    git clone https://github.com/0xPratikPatil/NmapMCP.git
    cd NmapMCP
    
  2. Install uv:

    curl -LsSf https://astral.sh/uv/install.sh | sh
    
  3. Create environment:

    uv venv
    
  4. Install dependencies from pyproject.toml

    uv pip install
    

    or

    uv pip install -r pyproject.toml
    

Configuration

To configure the Nmap MCP Server, edit the claude_desktop_config.json file located in the project root. This file allows you to set default scan arguments, define MCP tool behaviors, and adjust logging settings.

Example claude_desktop_config.json:

{
  "mcpServers": {
    "NmapMCP": {
      "command": "uv",
      "args": [
        "--directory",
        "/path/to/NmapMCP",
        "run",
        "main.py"
      ]
    }
  }
}

Contributing

Contributions are welcome! To contribute:

  1. Fork the Repository: Click the "Fork" button at the top right of the repository page.

  2. Clone Your Fork:

    git clone https://github.com/0xPratikPatil/NmapMCP.git
    
  3. Create a New Branch:

    git checkout -b feature/your-feature-name
    
  4. Make Your Changes: Implement your feature or fix.

  5. Run Tests: Ensure all tests pass.

  6. Commit Changes:

    git commit -m "Add feature: your feature name"
    
  7. Push to Your Fork:

    git push origin feature/your-feature-name
    
  8. Submit a Pull Request: Navigate to the original repository and click "New Pull Request."

License

This project is licensed under the MIT License.

Acknowledgments

Special thanks to the Nmap and MCP communities for their invaluable tools and support.

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Yasir Eryilmaz
  • AI scriptwriting assistant for short, engaging video content.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • https://zenepic.net
  • Embark on a thrilling diplomatic quest across a galaxy on the brink of war. Navigate complex politics and alien cultures to forge peace and avert catastrophe in this immersive interstellar adventure.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • https://reddgr.com
  • Delivers concise Python code and interprets non-English comments

  • huahuayu
  • A unified API gateway for integrating multiple etherscan-like blockchain explorer APIs with Model Context Protocol (MCP) support for AI assistants.

  • zhaoyunxing92
  • 本项目是一个钉钉MCP(Message Connector Protocol)服务,提供了与钉钉企业应用交互的API接口。项目基于Go语言开发,支持员工信息查询和消息发送等功能。

  • deemkeen
  • control your mbot2 with a power combo: mqtt+mcp+llm

  • justmywyw
  • Short and sweet example MCP server / client implementation for Tools, Resources and Prompts.

    Reviews

    1 (1)
    Avatar
    user_rCcRcxkx
    2025-04-16

    As a dedicated user of NmapMCP, I must say it's an incredible tool for network scanning and security auditing. Created by 0xPratikPatil, it integrates seamlessly with MCP applications, making it highly efficient in detecting vulnerabilities. The GitHub link provides easy access to the repository, where you can explore its robust features. Highly recommended for anyone in need of a reliable and powerful network scanning solution!