npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

gc-httpx-mcp

v1.1.0

Published

Model Context Protocol (MCP) server for httpx - Fast HTTP toolkit for port scanning and service detection

Readme

httpx MCP

httpx MCP is a bridge that connects httpx, a fast and multi-purpose HTTP toolkit for probing web servers, with the Model Context Protocol (MCP) ecosystem.

Overview

httpx MCP enables seamless integration of httpx's capabilities to scan and analyze HTTP/HTTPS services into MCP-compatible applications and AI-powered workflow systems. This bridge allows you to detect active web services, extract valuable information about web servers, and identify technologies in use through a standardized protocol, making it easier to incorporate into automated security testing pipelines or AI assistant capabilities.

Features

  • Integration with httpx to scan for active HTTP and HTTPS services
  • Support for multiple target domains in a single scan
  • Customizable port scanning
  • Extensive probing options for detailed web server analysis
  • Technology detection based on the Wappalyzer dataset
  • Response analysis including status codes, headers, and content
  • Simple configuration and setup
  • Easy integration with other MCP-compatible tools and systems
  • Standardized input/output handling

Installation

Prerequisites

  • Node.js (v16 or higher)
  • httpx installed on your system
  • MCP SDK

Setup

  1. Clone this repository:
git clone https://github.com/cyproxio/mcp-for-security
cd httpx-mcp
  1. Install dependencies:
npm install
  1. Build the project:
npm run build

Usage

Basic Configuration

Configure the httpx MCP server in your MCP client configuration:

{
  "httpx": {
    "command": "node",
    "args": [
      "/path/to/httpx-mcp/build/index.js",
      "httpx"
    ]
  }
}

Running httpx

Once configured, you can run httpx through the MCP interface using the httpx tool:

// Example of calling httpx through MCP for a single domain
const result = await mcp.tools.invoke("httpx", {
  target: ["example.com"]
});

// Example of calling httpx with multiple targets and probes
const detailedResult = await mcp.tools.invoke("httpx", {
  target: ["example.com", "example.org", "example.net"],
  ports: ["80", "443", "8080", "8443"],
  probes: ["title", "status-code", "tech-detect", "web-server"]
});

Parameters

httpx MCP supports the following parameters:

  • target: A list of domain names to scan for HTTP and HTTPS services (required)
  • ports: Custom ports to scan (optional, defaults to standard HTTP/HTTPS ports)
  • probes: List of probe options to extract specific information (optional)

Available Probe Options

  • status-code: Display response status-code
  • content-length: Display response content-length
  • content-type: Display response content-type
  • location: Display response redirect location
  • favicon: Display mmh3 hash for '/favicon.ico' file
  • hash: Display response body hash (supported: md5, mmh3, simhash, sha1, sha256, sha512)
  • jarm: Display jarm fingerprint hash
  • response-time: Display response time
  • line-count: Display response body line count
  • word-count: Display response body word count
  • title: Display page title
  • body-preview: Display first N characters of response body (default 100)
  • web-server: Display server name
  • tech-detect: Display technology in use based on wappalyzer dataset
  • method: Display HTTP request method
  • websocket: Display server using websocket
  • ip: Display host IP
  • cname: Display host CNAME
  • extract-fqdn: Get domain and subdomains from response body and header
  • asn: Display host ASN information
  • cdn: Display CDN/WAF in use (default true)
  • probe: Display probe status

Examples

Basic Scan of Multiple Domains

const result = await mcp.tools.invoke("httpx", {
  target: ["example.com", "example.org", "example.net"]
});

Scan with Custom Ports

const result = await mcp.tools.invoke("httpx", {
  target: ["example.com"],
  ports: ["80", "443", "8080", "8443"]
});

Comprehensive Web Technology Analysis

const result = await mcp.tools.invoke("httpx", {
  target: ["example.com"],
  probes: ["tech-detect", "web-server", "title", "status-code", "content-type"]
});

Extract Subdomains from Response

const result = await mcp.tools.invoke("httpx", {
  target: ["example.com"],
  probes: ["extract-fqdn", "status-code"]
});

Integration with AI Assistants

httpx MCP is designed to work seamlessly with AI assistants that support the Model Context Protocol, enabling natural language interactions for web server discovery and analysis.

Example conversation with an AI assistant:

User: Can you check what web technologies are used by example.com?
AI: I'll scan example.com to identify the web technologies in use.

[AI uses httpx MCP to scan the domain and returns the results]

I found the following technologies on example.com:
- Web Server: nginx/1.18.0
- Technologies: Bootstrap, jQuery, Google Analytics
- Status Code: 200 OK
- Title: Example Domain

Would you like me to analyze any other aspects of this website?

Security Considerations

  • This tool is intended for legitimate security research and testing
  • Always obtain proper authorization before scanning websites
  • Respect rate limits to avoid overwhelming target servers
  • Use responsibly and ethically
  • The tool only performs passive analysis of publicly available information

Troubleshooting

If you encounter issues:

  1. Verify httpx is properly installed and accessible
  2. Check the path to the httpx executable in your configuration
  3. Ensure proper permissions are set for execution
  4. Review server logs for detailed error messages
  5. For large scans, consider increasing timeouts or memory limits

Usage Tips

  • Combine httpx results with other reconnaissance tools for more comprehensive target information
  • Use the tech-detect probe to quickly identify technologies that might have known vulnerabilities
  • The extract-fqdn probe can help discover additional subdomains not found through other methods
  • Use body-preview to get a quick glimpse of the response content without downloading everything
  • The CDN detection can help identify which targets might be protected by WAFs

Acknowledgments

  • httpx Project: https://github.com/projectdiscovery/httpx
  • Model Context Protocol: https://github.com/modelcontextprotocol