Bug Bounty MCP Server

Bug Bounty MCP Server

A comprehensive MCP server for automated bug bounty hunting and security reconnaissance, featuring over 28 specialized tools for subdomain discovery, vulnerability scanning, and traffic analysis. It integrates automated scope validation and professional reporting across multiple platforms like HackerOne and Bugcrowd to streamline security testing.

Category
Visit Server

README

Bug Bounty MCP Server

A comprehensive Model Context Protocol (MCP) server for automated bug bounty hunting and security reconnaissance.

šŸš€ Quick Start

# Clone and install
git clone https://github.com/akinabudu/bug-bounty-mcp.git
cd bug-bounty-mcp

# Complete installation (dependencies + 25+ security tools)
./setup.sh install

# Start the MCP server
./setup.sh start

✨ Features

  • 28+ Security Tools - Comprehensive reconnaissance to vulnerability scanning
  • Automated Scope Validation - Never test out-of-scope targets
  • Multiple Platforms - HackerOne, Bugcrowd, Intigriti, YesWeHack support
  • Intelligent Caching - Avoid duplicate work with smart caching
  • Complete Audit Trail - Track all testing activities
  • Professional Reports - Generate detailed findings reports
  • Traffic Interception - Real-time HTTP/HTTPS traffic analysis with mitmproxy

šŸ› ļø Available Tools

Management (5 tools)

Program management, scope validation, statistics

Reconnaissance (14 tools)

  • subdomain_enum - Fast subdomain discovery (subfinder)
  • advanced_subdomain_enum - Advanced enumeration (amass)
  • web_crawl - Web crawling (gospider + katana)
  • network_scan - Fast network scanning (masscan)
  • screenshot_recon - Visual reconnaissance (gowitness)
  • git_recon - Git repository and secret scanning
  • cloud_asset_enum - Cloud asset discovery (AWS/Azure/GCP)
  • cert_transparency_search - Certificate transparency logs
  • email_harvest - Email harvesting (theHarvester)
  • ldap_enum - LDAP/Active Directory enumeration
  • api_discovery - API endpoint discovery
  • port_scan - Port scanning with nmap
  • technology_detection - Web technology detection
  • dns_enumeration - DNS record discovery

Vulnerability Scanning (3 tools)

  • nuclei_scan - Comprehensive vulnerability scanning
  • xss_scan - Cross-Site Scripting detection
  • ssl_analysis - SSL/TLS configuration analysis

Fuzzing (2 tools)

  • path_fuzzing - Directory and file fuzzing
  • parameter_fuzzing - HTTP parameter fuzzing

Traffic Analysis (3 tools) NEW!

  • start_traffic_intercept - Start mitmproxy for traffic capture
  • analyze_traffic_flows - Analyze captured HTTP/HTTPS traffic
  • extract_api_endpoints - Extract API endpoints from traffic

Reporting (3 tools)

  • generate_report - Comprehensive reports
  • export_findings - Export in multiple formats
  • get_statistics - Detailed metrics

šŸ“‹ Requirements

  • Python 3.8+
  • Go 1.19+ (for reconnaissance tools)
  • Linux/macOS (Ubuntu 20.04+ recommended)
  • 4GB+ RAM, 10GB+ disk space

šŸ”§ Installation Options

# Full installation
./setup.sh install

# Install dependencies only
./setup.sh install-deps

# Install reconnaissance tools only  
./setup.sh install-tools

# Setup configuration
./setup.sh setup

# Test installation
./setup.sh test

# Verify tools are working
./setup.sh verify

# Clean temporary files
./setup.sh clean

šŸŽÆ Usage Example

# 1. Add bug bounty program
await add_program(
    program_name="Example Corp",
    platform="hackerone", 
    scope_domains=["*.example.com"]
)

# 2. Comprehensive reconnaissance
subdomains = await advanced_subdomain_enum(
    program_id="example",
    domain="example.com",
    mode="passive"
)

# 3. Web application testing
crawl_data = await web_crawl(
    program_id="example",
    url="https://example.com",
    depth=3,
    js_analysis=True
)

# 4. Vulnerability scanning  
vulns = await nuclei_scan(
    program_id="example",
    target="https://example.com"
)

# 5. Generate professional report
report = await generate_report(
    program_id="example",
    scan_ids=["scan1", "scan2"],
    format="markdown"
)

šŸ“– Documentation

For complete documentation, see DOCUMENTATION.md:

  • Installation Guide - Detailed setup instructions
  • Configuration - Program and tool configuration
  • Tool Reference - Complete tool documentation
  • Usage Examples - Real-world usage patterns
  • Troubleshooting - Common issues and solutions
  • Contributing - Development and contribution guide

šŸ”’ Security & Ethics

  • Scope Validation: All tools automatically validate targets against program scope
  • Rate Limiting: Built-in rate limiting to avoid overwhelming targets
  • Audit Logging: Complete audit trail of all testing activities
  • Responsible Disclosure: Always follow program rules and responsible disclosure

āš ļø Important: This tool is for authorized security testing only. Always ensure you have proper authorization before testing any targets.

šŸ“ Project Structure

bug-bounty-mcp/
ā”œā”€ā”€ src/bugbounty_mcp/     # Main source code
ā”œā”€ā”€ config/                # Configuration files
ā”œā”€ā”€ data/                  # Nuclei templates, payloads
ā”œā”€ā”€ reports/               # Generated reports and findings
ā”œā”€ā”€ logs/                  # Audit logs and debugging
ā”œā”€ā”€ cache/                 # Cached scan results
ā”œā”€ā”€ setup.sh              # Installation and management script
ā”œā”€ā”€ DOCUMENTATION.md       # Complete documentation
└── README.md             # This file

šŸ¤ Contributing

Contributions welcome! See CONTRIBUTING.md for guidelines.

šŸ“„ License

MIT License - see LICENSE for details.

šŸ™ Acknowledgments

  • ProjectDiscovery for excellent Go tools (subfinder, katana, nuclei)
  • OWASP Amass team for advanced subdomain enumeration
  • Security research community for tool development and feedback

Made with ā¤ļø for the bug bounty community

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
E2B

E2B

Using MCP to run code via e2b.

Official
Featured