Skip to main content
Glama

Bug Bounty MCP Server

by SlanyCukr

nmap_scan

Execute enhanced Nmap scans on targets with real-time logging for version detection, script execution, and custom port scanning to identify network vulnerabilities and services.

Instructions

Execute an enhanced Nmap scan against a target with real-time logging.

Args: target: The IP address or hostname to scan scan_type: Scan type (e.g., -sV for version detection, -sC for scripts) ports: Comma-separated list of ports or port ranges additional_args: Additional Nmap arguments

Returns: Scan results with enhanced telemetry

Input Schema

NameRequiredDescriptionDefault
additional_argsNo
portsNo
scan_typeNo-sV
targetYes

Input Schema (JSON Schema)

{ "properties": { "additional_args": { "default": "", "title": "Additional Args", "type": "string" }, "ports": { "default": "", "title": "Ports", "type": "string" }, "scan_type": { "default": "-sV", "title": "Scan Type", "type": "string" }, "target": { "title": "Target", "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/SlanyCukr/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server