Skip to main content
Glama

Bug Bounty MCP Server

by SlanyCukr

wafw00f_scan

Identify Web Application Firewall (WAF) protection by scanning target URLs to detect security configurations and bypass opportunities during penetration testing.

Instructions

Execute wafw00f to identify Web Application Firewall (WAF) protection.

Args: target: Target URL findall: Find all possible WAFs proxy: Proxy server to use headers: Custom HTTP headers output_file: Output file path additional_args: Additional wafw00f arguments

Returns: WAF detection results

Input Schema

NameRequiredDescriptionDefault
additional_argsNo
findallNo
headersNo
output_fileNo
proxyNo
targetYes

Input Schema (JSON Schema)

{ "properties": { "additional_args": { "default": "", "title": "Additional Args", "type": "string" }, "findall": { "default": false, "title": "Findall", "type": "boolean" }, "headers": { "default": "", "title": "Headers", "type": "string" }, "output_file": { "default": "", "title": "Output File", "type": "string" }, "proxy": { "default": "", "title": "Proxy", "type": "string" }, "target": { "title": "Target", "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/SlanyCukr/bugbounty-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server