Skip to main content
Glama

Bug Bounty MCP Server

by SlanyCukr

dnsenum_scan

Perform DNS enumeration and subdomain discovery to identify potential attack surfaces during security assessments and reconnaissance activities.

Instructions

Execute dnsenum for DNS enumeration and subdomain discovery.

Args: domain: Target domain dns_server: DNS server to use wordlist: Wordlist for brute force threads: Number of threads delay: Delay between requests reverse: Enable reverse DNS lookup additional_args: Additional dnsenum arguments

Returns: DNS enumeration results

Input Schema

NameRequiredDescriptionDefault
additional_argsNo
delayNo
dns_serverNo
domainYes
reverseNo
threadsNo
wordlistNo

Input Schema (JSON Schema)

{ "properties": { "additional_args": { "default": "", "title": "Additional Args", "type": "string" }, "delay": { "default": 0, "title": "Delay", "type": "integer" }, "dns_server": { "default": "", "title": "Dns Server", "type": "string" }, "domain": { "title": "Domain", "type": "string" }, "reverse": { "default": false, "title": "Reverse", "type": "boolean" }, "threads": { "default": 5, "title": "Threads", "type": "integer" }, "wordlist": { "default": "", "title": "Wordlist", "type": "string" } }, "required": [ "domain" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/SlanyCukr/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server