ExternalAttacker
STDIOMCP server for automated external attack surface management and reconnaissance with natural language interface
MCP server for automated external attack surface management and reconnaissance with natural language interface

ExternalAttacker is a powerful integration that brings automated scanning capabilities with natural language interface for comprehensive external attack surface management and reconnaissance.
🔍 Automated Attack Surface Management with AI!
Scan domains, analyze infrastructure, and discover vulnerabilities using natural language.
ExternalAttacker combines the power of:
Join our Telegram channel for updates, tips, and discussion:
Clone this repository:
git clone https://github.com/mordavid/ExternalAttacker-MCP.git cd ExternalAttacker
Install Python dependencies:
pip install -r requirements.txt
Install required Go tools:
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest go install -v github.com/projectdiscovery/naabu/v2/cmd/naabu@latest go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest go install -v github.com/projectdiscovery/cdncheck/cmd/cdncheck@latest go install -v github.com/projectdiscovery/tlsx/cmd/tlsx@latest go install -v github.com/ffuf/ffuf@latest go install github.com/OJ/gobuster/v3@latest go install -v github.com/projectdiscovery/dnsx/cmd/dnsx@latest
Run ExternalAttacker-App.py
python ExternalAttacker-App.py # Access http://localhost:6991
Configure the MCP Server
"mcpServers": { "ExternalAttacker-MCP": { "command": "python", "args": [ "<Your_Path>\\ExternalAttacker-MCP.py" ] } }
Example queries you can ask through the MCP:
MIT License
Note: This is a security tool. Please use responsibly and only on systems you have permission to test.