gc-ffuf-mcp
v1.1.5
Published
Model Context Protocol (MCP) server for interacting with ffuf web fuzzer
Maintainers
Readme
FFUF MCP
FFUF MCP is a bridge that connects FFUF (Fuzz Faster U Fool), the high-speed web fuzzer, with the Model Context Protocol (MCP) ecosystem.
Overview
FFUF MCP enables seamless integration of FFUF's powerful web fuzzing capabilities into MCP-compatible applications and AI-powered workflow systems. This bridge allows you to leverage FFUF functionality through a standardized protocol, making it easier to incorporate into automated security testing pipelines or AI assistant capabilities.
Features
- Full FFUF functionality exposed through MCP
- Simple configuration and setup
- Easy integration with other MCP-compatible tools and systems
- Standardized input/output handling
Installation
Prerequisites
- Node.js (v16 or higher)
- FFUF installed on your system
Installation
# Install globally
npm install -g gc-ffuf-mcp
# Or run directly without installing
npx gc-ffuf-mcpConfiguration
This server requires the path to the FFUF executable to be set via the FFUF_PATH environment variable.
Example:
# Linux/macOS
export FFUF_PATH=/usr/local/bin/ffuf
# Windows
set FFUF_PATH=C:\path\to\ffuf\ffuf.exeUsage
Command Line
# With FFUF_PATH environment variable set
npx gc-ffuf-mcpWith Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"ffuf": {
"command": "npx",
"args": ["-y", "gc-ffuf-mcp"],
"env": {
"FFUF_PATH": "C:\\path\\to\\ffuf\\ffuf.exe"
}
}
}
}With Other MCP Clients
For other MCP clients, you can configure them to use this server with:
FFUF_PATH=/path/to/ffuf npx gc-ffuf-mcpRunning FFUF Tests
Once configured, you can run FFUF tests through the MCP interface using the do-ffuf tool:
// Example of calling FFUF through MCP
const result = await mcp.tools.invoke("do-ffuf", {
url: "http://example.com/FUZZ",
ffuf_args: ["-w", "/path/to/wordlist.txt"]
});Available Options
FFUF MCP supports all standard FFUF parameters. See the FFUF documentation for a full list of available options.
Examples
Directory Fuzzing
const result = await mcp.tools.invoke("do-ffuf", {
url: "http://target-website.com/FUZZ",
ffuf_args: [
"-w", "/path/to/common-directories.txt",
"-mc", "200,204,301,302,307,401,403"
]
});Integration with AI Assistants
FFUF MCP is designed to work seamlessly with AI assistants that support the Model Context Protocol, enabling natural language interactions for security testing tasks.
Example conversation with an AI assistant:
User: Fuzz for hidden directories on http://example.com
AI: I'll help you fuzz for hidden directories using FFUF.
[AI uses FFUF MCP to run the test and returns the results]
FFUF has discovered the following directories:
- /admin (Status: 301)
- /api (Status: 200)
- /backup (Status: 403)
...Troubleshooting
If you encounter issues:
- Verify FFUF is properly installed and accessible
- Check the path to the FFUF executable in your configuration
- Ensure proper permissions are set for execution
- Review server logs for detailed error messages
License
Apache-2.0
Acknowledgments
- FFUF Project: https://github.com/ffuf/ffuf
- Model Context Protocol: https://github.com/modelcontextprotocol
