Skip to main content
Glama

Bug Bounty MCP Server

by SlanyCukr

nikto_scan

Scan web servers for vulnerabilities by executing Nikto with configurable options for target, port, SSL, plugins, output format, and evasion techniques.

Instructions

Execute Nikto web server vulnerability scanner.

Args: target: Target hostname or IP address port: Port number to scan ssl: Use SSL/HTTPS plugins: Nikto plugins to run output_format: Output format (txt, xml, csv) evasion: Evasion techniques to use additional_args: Additional Nikto arguments

Returns: Web server vulnerability scan results

Input Schema

NameRequiredDescriptionDefault
additional_argsNo
evasionNo
output_formatNotxt
pluginsNo
portNo80
sslNo
targetYes

Input Schema (JSON Schema)

{ "properties": { "additional_args": { "default": "", "title": "Additional Args", "type": "string" }, "evasion": { "default": "", "title": "Evasion", "type": "string" }, "output_format": { "default": "txt", "title": "Output Format", "type": "string" }, "plugins": { "default": "", "title": "Plugins", "type": "string" }, "port": { "default": "80", "title": "Port", "type": "string" }, "ssl": { "default": false, "title": "Ssl", "type": "boolean" }, "target": { "title": "Target", "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/SlanyCukr/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server