Offers dedicated Drupal CMS security scanning capabilities, including module analysis, vulnerability detection, and configuration security assessment
Provides reconnaissance capabilities for code repository analysis, including searching for repositories that mention target domains and analyzing source code for sensitive information during security assessments
Enables automated Google dorking for security reconnaissance, allowing systematic search engine queries to discover exposed information, files, and potential vulnerabilities on target domains
Provides specialized security testing tools for GraphQL APIs, including query analysis, schema introspection, and GraphQL-specific vulnerability detection
Enables comprehensive Joomla CMS security testing with specialized tools for component analysis, vulnerability scanning, and security configuration review
Integrates threat intelligence capabilities for analyzing domains, URLs, and files during security assessments, providing malware detection and reputation scoring for discovered assets
Provides specialized CMS scanning tools for WordPress security analysis, including vulnerability detection, plugin enumeration, and configuration assessment
BugBounty MCP Server
A comprehensive Model Context Protocol (MCP) server for bug bounty hunting and web application penetration testing. This tool allows you to perform extensive security testing through natural language conversations with an LLM.
🚀 Features
🔍 Reconnaissance (13 Tools)
- Subdomain Enumeration: Passive and active subdomain discovery
- DNS Enumeration: Comprehensive DNS record analysis
- WHOIS Lookup: Domain registration and ownership information
- Certificate Transparency: SSL certificate log analysis
- Google Dorking: Automated search engine reconnaissance
- Shodan/Censys Integration: IoT and service discovery
- GitHub Reconnaissance: Code repository analysis
- Archive.org Search: Historical website analysis
- Technology Detection: Web stack fingerprinting
- Social Media Search: OSINT across platforms
- Email Enumeration: Email address discovery
- Reverse DNS: IP to hostname resolution
- WAF Detection: Web Application Firewall identification
🌐 Scanning (15 Tools)
- Port Scanning: Comprehensive network port analysis
- Service Enumeration: Detailed service fingerprinting
- Web Directory Scanning: Hidden file/directory discovery
- Web Crawling: Automated website exploration
- Parameter Discovery: Hidden parameter identification
- Subdomain Takeover: Vulnerability detection
- SSL/TLS Analysis: Certificate security assessment
- CMS Scanning: WordPress/Drupal/Joomla analysis
- JavaScript Analysis: Client-side security review
- HTTP Methods Testing: Verb tampering detection
- CORS Analysis: Cross-origin policy testing
- Security Headers: HTTP header security analysis
- Nuclei Integration: Vulnerability template scanning
- Fuzzing: Input validation testing
- API Endpoint Discovery: REST/GraphQL/SOAP analysis
🛡️ Vulnerability Assessment (15 Tools)
- SQL Injection Testing: Automated SQLi detection
- XSS Testing: Cross-site scripting analysis
- Command Injection: OS command execution testing
- File Inclusion (LFI/RFI): Path traversal analysis
- XXE Testing: XML external entity detection
- SSRF Testing: Server-side request forgery
- IDOR Testing: Insecure direct object reference
- CSRF Testing: Cross-site request forgery
- Authentication Bypass: Login mechanism testing
- Privilege Escalation: Permission boundary testing
- JWT Security: JSON Web Token analysis
- Session Management: Session security assessment
- Race Condition: Concurrency vulnerability testing
- Business Logic: Workflow security analysis
- Deserialization: Unsafe object handling detection
🌍 Web Application (10 Tools)
- Access Control Testing: Authorization boundary testing
- Security Misconfiguration: Configuration weakness detection
- Sensitive Data Exposure: Information leakage analysis
- API Security Testing: REST/GraphQL security assessment
- File Upload Security: Upload mechanism testing
- Input Validation: Data sanitization analysis
- Cookie Security: Session cookie analysis
- WebSocket Security: Real-time communication testing
- GraphQL Security: Query language vulnerability testing
- Error Handling Analysis: Information disclosure via errors
🔧 Network Security (10 Tools)
- Network Discovery: Live host identification
- Firewall Detection: Security device identification
- Load Balancer Detection: Traffic distribution analysis
- CDN Detection: Content delivery network analysis
- Proxy Detection: Intermediary service identification
- Routing Analysis: Network path examination
- Bandwidth Testing: Network performance analysis
- Wireless Security: WiFi network assessment
- Network Sniffing: Packet capture and analysis
- Lateral Movement: Internal network exploration
🕵️ OSINT (10 Tools)
- Person Investigation: Individual background research
- Company Investigation: Corporate intelligence gathering
- Dark Web Monitoring: Hidden service surveillance
- Data Breach Checking: Credential exposure analysis
- Social Media Investigation: Profile analysis across platforms
- Paste Site Monitoring: Leaked information detection
- Code Repository Search: Source code intelligence
- Geolocation Investigation: Physical presence analysis
- Threat Intelligence: IoC analysis and attribution
- Metadata Extraction: Document forensics
⚔️ Exploitation (10 Tools)
- Exploit Search: Vulnerability database queries
- Payload Generation: Custom exploit creation
- Privilege Escalation: System access expansion
- Lateral Movement: Network propagation techniques
- Persistence Mechanisms: Backdoor installation methods
- Data Exfiltration: Information extraction techniques
- Credential Dumping: Password harvesting methods
- Anti-Forensics: Evidence elimination techniques
- Evasion Techniques: Security control bypass
- Social Engineering: Human factor exploitation
📊 Reporting (10 Tools)
- Vulnerability Reports: Comprehensive security assessments
- Executive Summaries: Business-focused reporting
- Finding Tracking: Vulnerability lifecycle management
- Metrics Dashboard: Security KPI visualization
- Data Export: Multi-format result export
- Remediation Planning: Prioritized fix roadmaps
- Compliance Mapping: Framework alignment analysis
- Risk Assessment: Business impact evaluation
- Scan Comparison: Historical trend analysis
- Proof of Concept: Exploit documentation
📋 Total: 92+ Security Testing Tools
🛠️ Installation
Prerequisites
- Python 3.10 or higher (Python 3.11+ recommended)
- Git
- Docker (for containerized deployment)
- macOS, Linux, or Windows with WSL
🐳 Docker Installation (Recommended)
The easiest way to get started is using Docker, which includes all dependencies and security tools pre-installed.
Quick Docker Start
- Clone the repository:
- Configure API keys (optional but recommended):
- Build and run with Docker Compose:
Manual Docker Commands
Docker Environment Variables
You can pass API keys and configuration directly to Docker:
What's Included in Docker Image
The Docker image includes:
- ✅ Python 3.11 with all required packages
- ✅ All 20+ security tools (nmap, nuclei, subfinder, httpx, etc.)
- ✅ Essential wordlists for scanning
- ✅ Optimized for security and performance
- ✅ Non-root user for enhanced security
- ✅ Health checks and monitoring
🔧 Native Installation
Quick Start
- Clone the repository:
- Run the automated installation:OR for manual installation:
- Create virtual environment:
- Install dependencies:
- Install external security tools (optional but recommended):
- Configure API keys (optional):
- Download wordlists:
- Validate configuration:
🎯 Usage
Starting the MCP Server
� Docker Usage (Recommended)
Using Docker Compose (easiest):
Using Docker directly:
🚀 Native Usage with run.sh
The easiest way to start the server natively is using the provided run.sh
script:
The script will:
- ✅ Automatically activate the virtual environment
- ✅ Load environment variables from
.env
file - ✅ Display server status and available tools
- ✅ Start the MCP server for LLM integration
📋 Command Line Interface
🤖 MCP Server Integration with LLMs
The BugBounty MCP Server implements the Model Context Protocol (MCP), enabling seamless integration with various LLM applications for natural language penetration testing.
🔗 Supported LLM Clients
1. Claude Desktop (Recommended)
Add to your Claude Desktop configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
For Docker (recommended):
For Native Installation:
2. VS Code with GitHub Copilot Integration
To use the BugBounty MCP Server with VS Code and GitHub Copilot:
Prerequisites:
- VS Code with GitHub Copilot extension enabled
- MCP extension for VS Code (if available in marketplace)
Configuration Steps:
- For Docker Deployment (Recommended):First, ensure your Docker container is running with port 3001 exposed:Then configure VS Code MCP settings by opening VS Code settings (
Cmd/Ctrl + ,
) and adding:Alternative Docker configuration using direct Docker exec: - For Native Installation:
- Verify Connection:
- Restart VS Code or reload the MCP extension
- Open the MCP panel in VS Code (if available)
- You should see the BugBounty server connected
- Test by asking GitHub Copilot: "List available security tools from BugBounty MCP"
- Troubleshooting Docker Integration:If using the Docker network approach and experiencing issues:
3. Custom MCP Clients
4. Integration Examples
Start the server and test:
Example LLM conversation:
🔧 Troubleshooting MCP Integration
If the server doesn't start in Claude Desktop:
For Docker deployment:
- Ensure Docker container is running:
- Check container logs:
- Test Docker integration:
- Verify Docker socket access (macOS/Linux):
For Native deployment:
- Check the path in your config:
- Verify the run.sh script is executable:
- Test the server manually:
- Check Claude Desktop logs:
- macOS:
~/Library/Logs/Claude/
- Windows:
%LOCALAPPDATA%\Claude\logs\
- macOS:
🐳 Docker Advanced Usage
Development with Docker
Performance Tuning
Backup and Persistence
Docker Management Script
For easier Docker management, use the included docker.sh
script:
Example Configuration
🗣️ Natural Language Examples
Once integrated with an LLM, you can perform security testing through conversation:
Reconnaissance
Vulnerability Testing
Comprehensive Testing
OSINT Gathering
🔧 Configuration
Environment Variables
Variable | Description | Required |
---|---|---|
SHODAN_API_KEY | Shodan API key for device discovery | No |
VIRUSTOTAL_API_KEY | VirusTotal API key for threat intelligence | No |
CENSYS_API_ID | Censys API ID for certificate/host search | No |
CENSYS_API_SECRET | Censys API secret | No |
GITHUB_TOKEN | GitHub token for repository search | No |
SECURITYTRAILS_API_KEY | SecurityTrails API for DNS history | No |
HUNTER_IO_API_KEY | Hunter.io API for email discovery | No |
BINARYEDGE_API_KEY | BinaryEdge API for internet scanning | No |
Tool Paths
The server automatically detects tools in your PATH, but you can specify custom paths:
Safety Features
📁 Project Structure
🔒 Security Considerations
Responsible Usage
This tool is designed for authorized security testing only. Users must:
- Obtain explicit permission before testing any systems
- Comply with local laws and regulations
- Respect rate limits and avoid DoS conditions
- Follow responsible disclosure for any vulnerabilities found
Safety Features
- Target Whitelisting: Configure allowed targets
- Rate Limiting: Prevent overwhelming target systems
- Safe Mode: Enable additional safety checks
- Logging: Comprehensive audit trails
Legal Disclaimer
Users are solely responsible for ensuring their use of this tool complies with applicable laws and regulations. Gokul (apgokul008@gmail.com) is not responsible for any misuse or damage caused by this software.
🤝 Contributing
We welcome contributions! Please see our Contributing Guidelines for details.
Development Setup
- Clone and install in development mode:
- Install pre-commit hooks:
- Run tests:
📄 License
This project is licensed under the MIT License - see the LICENSE file for details.
🙏 Acknowledgments
- OWASP for security testing methodologies
- ProjectDiscovery for excellent security tools
- SecLists for comprehensive wordlists
- The bug bounty and security research community
📚 Documentation
- RUN_SCRIPT.md - Detailed
run.sh
script documentation - USAGE.md - Comprehensive usage examples and workflows
- SECURITY.md - Security guidelines and best practices
- env.example - Environment configuration template
📞 Support
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: See SECURITY.md for reporting security issues
🚀 Roadmap
- Web-based dashboard
- Integration with popular bug bounty platforms
- Machine learning-powered vulnerability detection
- Collaborative testing features
- Advanced evasion techniques
- Mobile application testing tools
- Cloud security assessment tools
- Blockchain security testing
⚠️ Warning: This tool is for authorized security testing only. Unauthorized use against systems you don't own or have explicit permission to test is illegal and unethical.
This server cannot be installed
hybrid server
The server is able to function both locally and remotely, depending on the configuration or use case.
Enables comprehensive security testing and penetration testing through natural language conversations with 92+ tools for reconnaissance, vulnerability assessment, web application testing, OSINT, and reporting. Designed for authorized bug bounty hunting and security assessments.