Skip to main content
Glama

nmap_scan

Scan network targets with nmap and automatically import results into Metasploit database for security testing workflows. Supports various scan types including quick, stealth, full, and UDP scans.

Instructions

Run an nmap scan and import results into Metasploit database

Input Schema

NameRequiredDescriptionDefault
targetYesTarget IP address or CIDR range
portsNoOptional: port range or specific ports (e.g., '80,443' or '1-1000')
scanTypeNoOptional: type of scan to performquick

Input Schema (JSON Schema)

{ "properties": { "ports": { "description": "Optional: port range or specific ports (e.g., '80,443' or '1-1000')", "type": "string" }, "scanType": { "default": "quick", "description": "Optional: type of scan to perform", "enum": [ "quick", "stealth", "full", "udp" ], "type": "string" }, "target": { "description": "Target IP address or CIDR range", "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/andreransom58-coder/kali-metasploit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server