sundayz-hunter/MCP_Recon
If you are the rightful owner of MCP_Recon and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
MCP Recon is a comprehensive Model Context Protocol server designed for web security reconnaissance and analysis, providing essential tools for cybersecurity professionals.
whois_info
Get WHOIS information
domain_history
Check domain reputation and history
dns_records
Get all DNS records for a domain
reverse_dns
Perform reverse DNS lookup
subdomain_enum_passive
Passive subdomain discovery via Certificate Transparency (crt.sh)
subdomain_enum_active
Active subdomain enumeration using DNS brute force
ip_information
Get comprehensive IP information
check_alive
Check if hosts respond via HTTP/HTTPS
port_scan
Advanced port scanning with Nmap
tls_certificate
Analyze TLS certificates
http_headers
Analyze HTTP security headers
detect_technologies
Detect web technologies
extract_urls
Extract URLs from web pages
MCP Recon
A comprehensive Model Context Protocol (MCP) server for web security reconnaissance and analysis. This toolkit provides cybersecurity professionals with essential reconnaissance capabilities through Python-native implementations, following the standard cybersecurity reconnaissance methodology.
š Features
š 1. Information Gathering (Passive Reconnaissance)
- WHOIS Information: Domain registration and ownership details
- Domain History: Reputation and historical data analysis
š 2. DNS Analysis (Infrastructure Discovery)
- DNS Records Lookup: Comprehensive DNS enumeration (A, AAAA, MX, NS, TXT, SPF, DMARC)
- Reverse DNS Lookup: IP to hostname resolution
- Passive Subdomain Enumeration: Certificate Transparency logs discovery via crt.sh (stealth)
- Active Subdomain Enumeration: DNS brute-force discovery using wordlist from subdomains.txt
š 3. Network Reconnaissance (Active Scanning)
- IP Information: Geolocation, ISP, and network details
- Alive Check: HTTP/HTTPS connectivity testing with response analysis
- Port Scanning: Advanced Nmap integration with multiple scan modes
š 4. Web Application Analysis (Application Layer)
- TLS Certificate Analysis: SSL/TLS certificate inspection and validation
- HTTP Headers Analysis: Security headers assessment and information disclosure detection
- Technology Detection: Web framework and technology fingerprinting
- URL Extraction: Web crawling and link discovery
š Installation
Prerequisites
- Python 3.10+
- UV Package Manager (automatically installed by script)
- Nmap (automatically installed by script)
Quick Installation
Windows (PowerShell)
.\install.ps1
Linux/macOS
chmod +x install.sh
./install.sh
Claude Desktop Configuration
Add this configuration to your Claude Desktop settings to connect the MCP Web Reconnaissance Server:
Windows Configuration
{
"mcpServers": {
"recon": {
"command": "C:\\Users\\YOUR_USERNAME\\.local\\bin\\uv.exe",
"args": [
"--directory",
"C:\\Users\\YOUR_USERNAME\\path\\to\\MCP_Recon",
"run",
"python",
"main.py"
]
}
}
}
Linux/macOS Configuration
{
"mcpServers": {
"recon": {
"command": "/home/YOUR_USERNAME/.local/bin/uv",
"args": [
"--directory",
"/home/YOUR_USERNAME/path/to/MCP_Recon",
"run",
"python",
"main.py"
]
}
}
}
Replace the following placeholders:
YOUR_USERNAME
with your actual usernamepath/to/MCP_Recon
with the actual path to your cloned repository
Configuration file locations:
- Windows:
%APPDATA%\Claude\claude_desktop_config.json
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
- Linux:
~/.config/Claude/claude_desktop_config.json
š Usage
Available Tools (Following Reconnaissance Methodology)
1. Information Gathering (Passive Reconnaissance)
whois_info
- Get WHOIS informationdomain_history
- Check domain reputation and history
2. DNS Analysis (Infrastructure Discovery)
dns_records
- Get all DNS records for a domainreverse_dns
- Perform reverse DNS lookupsubdomain_enum_passive
- Passive subdomain discovery via Certificate Transparency (crt.sh)subdomain_enum_active
- Active subdomain enumeration using DNS brute force
3. Network Reconnaissance (Active Scanning)
ip_information
- Get comprehensive IP informationcheck_alive
- Check if hosts respond via HTTP/HTTPSport_scan
- Advanced port scanning with Nmap
4. Web Application Analysis (Application Layer)
tls_certificate
- Analyze TLS certificateshttp_headers
- Analyze HTTP security headersdetect_technologies
- Detect web technologiesextract_urls
- Extract URLs from web pages
š§ Wordlists
Subdomain Wordlist Customization
You can customize subdomain enumeration in two ways:
1. Edit the wordlist file
Modify the subdomains.txt
file in the project root to add/remove subdomains:
www
api
admin
test
dev
staging
# Add your custom subdomains here
2. Provide custom wordlist in Claude Desktop chat
Port Scanning Options
The port scanner supports various modes optimized for different scenarios:
"common"
: Common services (21,22,23,25,53,80,443,etc.)"top100"
: Top 100 most common ports (recommended for initial reconnaissance)"top1000"
: Top 1000 ports (comprehensive discovery)"80,443,8080"
: Specific ports (targeted scanning)"1-1000"
: Port range (internal network scanning)
š Architecture
Project Structure
mcp-recon/
āāā main.py # MCP server entry point with organized tool categories
āāā subdomains.txt # Default subdomain wordlist (customizable)
āāā tools/
ā āāā info_tools.py # Information gathering utilities (WHOIS, domain history)
ā āāā dns_tools.py # DNS and domain reconnaissance
ā āāā network_tools.py # Network scanning and analysis
ā āāā web_tools.py # Web application analysis
āāā install.ps1 # Windows installation script
āāā install.sh # Linux/macOS installation script
āāā pyproject.toml # Python project configuration
āāā README.md # This documentation
š License
This project is licensed under the MIT License - see the LICENSE file for details.
ā ļø Disclaimer
This tool is intended for legitimate security research, penetration testing, and bug bounty activities only. Users are responsible for ensuring they have proper authorization before scanning or testing any networks, systems, or applications. The authors are not responsible for any misuse of this tool.
Always follow responsible disclosure practices and respect scope limitations in bug bounty programs.