A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
ExternalAttacker is a powerful integration that brings automated scanning capabilities with natural language interface for comprehensive external attack surface management and reconnaissance.
๐ Automated Attack Surface Management with AI!
Scan domains, analyze infrastructure, and discover vulnerabilities using natural language.
ExternalAttacker combines the power of:
Join our Telegram channel for updates, tips, and discussion:
Clone this repository:
git clone https://github.com/mordavid/ExternalAttacker-MCP.git
cd ExternalAttacker
Install Python dependencies:
pip install -r requirements.txt
Install required Go tools:
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/naabu/v2/cmd/naabu@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
go install -v github.com/projectdiscovery/cdncheck/cmd/cdncheck@latest
go install -v github.com/projectdiscovery/tlsx/cmd/tlsx@latest
go install -v github.com/ffuf/ffuf@latest
go install github.com/OJ/gobuster/v3@latest
go install -v github.com/projectdiscovery/dnsx/cmd/dnsx@latest
Run ExternalAttacker-App.py
python ExternalAttacker-App.py
# Access http://localhost:6991
Configure the MCP Server
"mcpServers": {
"ExternalAttacker-MCP": {
"command": "python",
"args": [
"<Your_Path>\\ExternalAttacker-MCP.py"
]
}
}
Example queries you can ask through the MCP:
MIT License
Note: This is a security tool. Please use responsibly and only on systems you have permission to test.
{ "mcpServers": { "externalattacker-mcp": { "command": "python", "args": [ "<Your_Path>\\ExternalAttacker-MCP.py" ] } } }
Related projects feature coming soon
Will recommend related projects based on sub-categories