An external reconnaissnce MCP server for offensive security engagements
{
"mcpServers": {
"mcp-external-recon-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
An external reconnaissnce MCP server for offensive security engagements
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 362 days ago. 13 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
DataForSEO API modelcontextprotocol server
MCP server for Yandex.Direct API — campaigns, ads, statistics, keywords. Bearer token auth.
Bounding box(bbox) GIS tool: coords conversion, EPSG, WKT, GeoJSON, H3, Overpass, POI, map viz
Revenue intelligence MCP: RFM analysis, 14.5-point ICP scoring, pipeline health. HubSpot.
MCP Security Weekly
Get CVE alerts and security updates for Mcp External Recon Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server for performing active external reconnaissance activities against a domain. This tool provides a simple suite of reconnaissance capabilities including DNS enumeration, subdomain discovery, email security analysis, and SSL certificate inspection.
This project was created as a PoC for my tutorial on creating your own MCP server here
[!CAUTION] This is intended solely as a demonstration and is not production-ready. Use at your own risk. Only use MCPs that you trust to run on your machine. While this is a relatively benign tool, it does run OS commands. Do not target systems that you do not have permission to target.
The following tools need to be installed on your system:
A subdomain wordlist has been supplied for brute-forcing, add to the list or replace for your own. (Note there is currently a limitation with very long wordlists).
For using a pre-built server, instructions from here: https://modelcontextprotocol.io/quickstart/user
curl -LsSf https://astral.sh/uv/install.sh | sh
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Open up the configuration file in any text editor. Replace the file contents with this:
{
"mcpServers": {
"external-recon": {
"command": "/ABSOLUTE/PATH/TO/PARENT/FOLDER/uv",
"args": [
"--directory",
"/ABSOLUTE/PATH/TO/PARENT/FOLDER/mcp-external-recon-server",
"run",
"external-recon.py"
]
}
}}
Relaunch Claude for Desktop You should now see two icons in the chat bar, a hammer which shows the tools available and a connection icon which shows the prompt defined and the input required (domain name)
Select the external-recon setup prompt and supply the target domain, you can then ask Claude to peform external recon and away she goes!
Contributions are welcome! Please feel free to submit pull requests.
This tool is for educational and authorized testing purposes only. Users are responsible for ensuring they have permission to test target systems.