A comprehensive Open Source Intelligence (OSINT) reconnaissance tool built as a Model Context Protocol (MCP) server. This tool provides various reconnaissance capabilities including IP scanning, BSSID lookups, username tracking, and more.
- IP Port Scanner: Scan IP addresses for open ports within specified ranges
- Wigle BSSID Lookup: Query Wigle database for wireless network information
- Username Tracker: Track usernames across multiple platforms and services
- Python 3.8 or higher
- UV package manager (recommended) or pip
- Internet connection for OSINT queries
- Valid API keys for external services (where applicable)
# Clone the repository
git clone https://github.com/yourusername/simple-osint-recon-mcp-tool.git
cd simple-osint-recon-mcp-tool
# Install dependencies with UV
uv sync
# Install in development mode
uv pip install -e .# Clone the repository
git clone https://github.com/yourusername/simple-osint-recon-mcp-tool.git
cd simple-osint-recon-mcp-tool
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Install in development mode
pip install -e .# Using UV
uv run dev mcp main.py
# Or directly with Python
python -m mcp main.py# Using UV
uv run mcp main.py
# Or with Python
python main.pyTo use this tool with Claude Desktop, add the following configuration to your Claude Desktop settings:
- Open Claude Desktop settings
- Navigate to the MCP servers section
- Add the following configuration:
{
"mcpServers": {
"simple-osint-recon": {
"command": "uv",
"args": ["run", "mcp", "main.py"],
"cwd": "/path/to/simple-osint-recon-mcp-tool"
}
}
}Or if using Python directly:
{
"mcpServers": {
"simple-osint-recon": {
"command": "python",
"args": ["main.py"],
"cwd": "/path/to/simple-osint-recon-mcp-tool"
}
}
}You can also integrate this tool with Claude via the Anthropic API by running it as an MCP server and connecting it to your Claude application.
Scan IP addresses for open ports within a specified range.
Parameters:
ip_address: Target IP address to scanstart_port: Starting port numberend_port: Ending port number
Example Usage:
Scan IP 192.168.1.1 from port 80 to 443
Query the Wigle database for wireless network information using BSSID.
Parameters:
bssid: MAC address of the wireless access point
Example Usage:
Look up BSSID AA:BB:CC:DD:EE:FF
Track usernames across multiple platforms and social media services.
Parameters:
username: Username to search for
Example Usage:
Track username "johndoe123" across platforms
Create a .env file in the project root with the following variables:
# Wigle API Configuration
WIGLE_API_USERNAME=your_wigle_username
WIGLE_API_PASSWORD=your_wigle_password
# Additional API keys for external services
OTHER_API_KEY=your_api_key_hereYou can also use a config.json file for additional settings:
{
"timeout": 30,
"max_threads": 10,
"default_ports": [22, 23, 53, 80, 110, 143, 443, 993, 995],
"log_level": "INFO"
}simple-osint-recon-mcp-tool/
βββ main.py # Main MCP server entry point
βββ requirements.txt # Python dependencies
βββ pyproject.toml # Project configuration
βββ README.md # This file
βββ .env.example # Environment variables template
βββ config.json # Configuration settings
βββ tools/ # Individual tool modules
β βββ __init__.py
β βββ ip_scanner.py
β βββ wigle_tool.py
β βββ username_tracker.py
- Port already in use: Ensure the port you're trying to use isn't occupied by another service
- API key errors: Verify your API keys are correctly set in the
.envfile - Permission denied: Run with appropriate permissions for network operations
- Module not found: Ensure all dependencies are installed correctly
Run the tool with debug logging:
uv run dev mcp main.py --debugCheck the log files in the logs/ directory for detailed error information.
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
This tool is intended for educational and authorized security testing purposes only. Users are responsible for ensuring they have proper authorization before scanning or analyzing any systems, networks, or services. The authors are not responsible for any misuse of this tool.
- Model Context Protocol Documentation
- Claude Desktop Integration Guide
- Wigle API Documentation
- OSINT Best Practices
Email - imashanilupul@gmail.com
Happy OSINT Hunting! π΅οΈββοΈ