@ebowwa/nmap-mcp
v1.0.1
Published
Nmap MCP server with 18 security tools for network scanning and reconnaissance
Maintainers
Readme
@mcp/nmap
Comprehensive Nmap MCP server with 18 security tools for network scanning, reconnaissance, and vulnerability assessment.
Features
- 18 Integrated Tools: From quick port scans to full vulnerability assessments
- Security Hardened: All arguments validated against whitelist and regex patterns
- Privilege Management: Auto-detects when sudo is needed for privileged operations
- Zod Validation: Full input validation with detailed error messages
- mDNS/Bonjour Discovery: Find Apple devices, printers, smart home devices
Tools
| Tool | Description |
|------|-------------|
| nmap_basic_scan | Quick/full/comprehensive scans with presets |
| nmap_service_detection | Detect service versions with -sV |
| nmap_os_detection | OS fingerprinting with -O |
| nmap_script_scan | Run NSE scripts (auth, vuln, brute, discovery) |
| nmap_vulnerability_scan | Specialized vulnerability scanning |
| nmap_custom_scan | Full control over nmap arguments |
| nmap_ping_scan | Host discovery without port scanning |
| nmap_port_scan | Fast port scan without service detection |
| nmap_mdns_discovery | Discover Bonjour/mDNS services on local network |
Installation
bun install
bun run buildConfiguration
Add to your Claude Desktop config (~/.config/claude-code/config.json):
{
"mcpServers": {
"nmap": {
"command": "node",
"args": ["/path/to/@mcp/nmap/dist/index.js"]
}
}
}Security
- All nmap arguments validated against
ALLOWED_FLAGSwhitelist - Shell metacharacter blocking via regex
- No command injection possible
- Privileged operations (SYN scan, OS detection, UDP) auto-request sudo
Examples
// Quick scan of common ports
{
"target": "192.168.1.1",
"scanType": "quick",
"timing": 4
}
// Full vulnerability scan
{
"target": "192.168.1.0/24",
"vulnCategory": "all"
}
// mDNS discovery for local devices
{
"target": "192.168.1.0/24",
"bonjour": true
}
// Custom stealth scan
{
"target": "192.168.1.1",
"nmapArgs": ["-sS", "-T2", "--data-length", "25"]
}Requirements
nmapinstalled on systemsudoaccess for privileged scans (SYN, OS detection, UDP)- Bun runtime for development
License
MIT
