21 production-grade MCP servers for OSINT, threat intelligence, and security reconnaissance. BYOK-friendly integrations for the tools security teams already use.
Each server is a standalone MCP integration — use them individually or as a complete suite.
Works with any MCP-compatible AI client.
Get the zip, extract it anywhere on your machine.
unzip reconstack-pro.zip -d ~/reconstack
Run the installer, add your API keys, configure Claude Desktop.
./install.sh && cp .env.example .env
./configure-claude.sh
Ask Claude to perform security research using natural language.
"Enumerate subdomains for target.com and check for exposed services"
Use the free tier, buy lifetime access, or subscribe for monthly support and power-user onboarding.
or $149 for team license (up to 10 seats)
$29 Solo • $59 Pro Ops • $99 Team SOC
BYOK policy: ReconStack provides the integration layer. Third-party API subscriptions are not included.
Seller note: replace each href=\"#\" purchase link with your live checkout URLs (Free, Pro, and Subscription).
Model Context Protocol (MCP) is an open standard that lets AI assistants like Claude, Cursor, and Windsurf use external tools. Each ReconStack server adds specific OSINT capabilities to your AI.
No. Key requirements vary by server. Several tools run without API keys (for example CRT.sh, Wayback, ExifTool, Holehe, Social Analyzer, Nmap), while others require provider credentials.
No. ReconStack Pro is BYOK. You get production integrations and automation workflows, and you connect your own provider API accounts.
Dorking Engine handles advanced multi-query workflows with caching and backend fallback. Google Dorker is a lightweight direct executor for quick targeted searches.
Yes. ReconStack uses only publicly available APIs and data sources. It's the same toolkit security professionals and bug bounty hunters use daily — just integrated with your AI assistant.
Bug fixes, new server additions, and compatibility updates. Pro buyers get access to the private GitHub repo for pull access to all future updates.
Absolutely. ReconStack is built for exactly this. Enumerate subdomains, scan for exposed services, check for leaked credentials, and generate reports — all through natural language.