Skip to main content
Glama
akinabudu
by akinabudu

Bug Bounty MCP Server

A comprehensive Model Context Protocol (MCP) server for automated bug bounty hunting and security reconnaissance.

šŸš€ Quick Start

# Clone and install
git clone https://github.com/akinabudu/bug-bounty-mcp.git
cd bug-bounty-mcp

# Complete installation (dependencies + 25+ security tools)
./setup.sh install

# Start the MCP server
./setup.sh start

✨ Features

  • 28+ Security Tools - Comprehensive reconnaissance to vulnerability scanning

  • Automated Scope Validation - Never test out-of-scope targets

  • Multiple Platforms - HackerOne, Bugcrowd, Intigriti, YesWeHack support

  • Intelligent Caching - Avoid duplicate work with smart caching

  • Complete Audit Trail - Track all testing activities

  • Professional Reports - Generate detailed findings reports

  • Traffic Interception - Real-time HTTP/HTTPS traffic analysis with mitmproxy

šŸ› ļø Available Tools

Management (5 tools)

Program management, scope validation, statistics

Reconnaissance (14 tools)

  • subdomain_enum - Fast subdomain discovery (subfinder)

  • advanced_subdomain_enum - Advanced enumeration (amass)

  • web_crawl - Web crawling (gospider + katana)

  • network_scan - Fast network scanning (masscan)

  • screenshot_recon - Visual reconnaissance (gowitness)

  • git_recon - Git repository and secret scanning

  • cloud_asset_enum - Cloud asset discovery (AWS/Azure/GCP)

  • cert_transparency_search - Certificate transparency logs

  • email_harvest - Email harvesting (theHarvester)

  • ldap_enum - LDAP/Active Directory enumeration

  • api_discovery - API endpoint discovery

  • port_scan - Port scanning with nmap

  • technology_detection - Web technology detection

  • dns_enumeration - DNS record discovery

Vulnerability Scanning (3 tools)

  • nuclei_scan - Comprehensive vulnerability scanning

  • xss_scan - Cross-Site Scripting detection

  • ssl_analysis - SSL/TLS configuration analysis

Fuzzing (2 tools)

  • path_fuzzing - Directory and file fuzzing

  • parameter_fuzzing - HTTP parameter fuzzing

Traffic Analysis (3 tools) NEW!

  • start_traffic_intercept - Start mitmproxy for traffic capture

  • analyze_traffic_flows - Analyze captured HTTP/HTTPS traffic

  • extract_api_endpoints - Extract API endpoints from traffic

Reporting (3 tools)

  • generate_report - Comprehensive reports

  • export_findings - Export in multiple formats

  • get_statistics - Detailed metrics

šŸ“‹ Requirements

  • Python 3.8+

  • Go 1.19+ (for reconnaissance tools)

  • Linux/macOS (Ubuntu 20.04+ recommended)

  • 4GB+ RAM, 10GB+ disk space

šŸ”§ Installation Options

# Full installation
./setup.sh install

# Install dependencies only
./setup.sh install-deps

# Install reconnaissance tools only  
./setup.sh install-tools

# Setup configuration
./setup.sh setup

# Test installation
./setup.sh test

# Verify tools are working
./setup.sh verify

# Clean temporary files
./setup.sh clean

šŸŽÆ Usage Example

# 1. Add bug bounty program
await add_program(
    program_name="Example Corp",
    platform="hackerone", 
    scope_domains=["*.example.com"]
)

# 2. Comprehensive reconnaissance
subdomains = await advanced_subdomain_enum(
    program_id="example",
    domain="example.com",
    mode="passive"
)

# 3. Web application testing
crawl_data = await web_crawl(
    program_id="example",
    url="https://example.com",
    depth=3,
    js_analysis=True
)

# 4. Vulnerability scanning  
vulns = await nuclei_scan(
    program_id="example",
    target="https://example.com"
)

# 5. Generate professional report
report = await generate_report(
    program_id="example",
    scan_ids=["scan1", "scan2"],
    format="markdown"
)

šŸ“– Documentation

For complete documentation, see DOCUMENTATION.md:

  • Installation Guide - Detailed setup instructions

  • Configuration - Program and tool configuration

  • Tool Reference - Complete tool documentation

  • Usage Examples - Real-world usage patterns

  • Troubleshooting - Common issues and solutions

  • Contributing - Development and contribution guide

šŸ”’ Security & Ethics

  • Scope Validation: All tools automatically validate targets against program scope

  • Rate Limiting: Built-in rate limiting to avoid overwhelming targets

  • Audit Logging: Complete audit trail of all testing activities

  • Responsible Disclosure: Always follow program rules and responsible disclosure

āš ļø Important: This tool is for authorized security testing only. Always ensure you have proper authorization before testing any targets.

šŸ“ Project Structure

bug-bounty-mcp/
ā”œā”€ā”€ src/bugbounty_mcp/     # Main source code
ā”œā”€ā”€ config/                # Configuration files
ā”œā”€ā”€ data/                  # Nuclei templates, payloads
ā”œā”€ā”€ reports/               # Generated reports and findings
ā”œā”€ā”€ logs/                  # Audit logs and debugging
ā”œā”€ā”€ cache/                 # Cached scan results
ā”œā”€ā”€ setup.sh              # Installation and management script
ā”œā”€ā”€ DOCUMENTATION.md       # Complete documentation
└── README.md             # This file

šŸ¤ Contributing

Contributions welcome! See CONTRIBUTING.md for guidelines.

šŸ“„ License

MIT License - see LICENSE for details.

šŸ™ Acknowledgments

  • ProjectDiscovery for excellent Go tools (subfinder, katana, nuclei)

  • OWASP Amass team for advanced subdomain enumeration

  • Security research community for tool development and feedback


Made with ā¤ļø for the bug bounty community

-
security - not tested
F
license - not found
-
quality - not tested

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/akinabudu/bug-bounty-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server