Discover our curated collection of MCP servers for security & testing. Browse 2859 servers and find the perfect MCPs for your needs.
Demonstrates the integration of Pydantic AI agents with the Box MCP server for secure content access.
Adapt any HTTP API into a Model Context Protocol (MCP) toolset for AI agent interaction.
Provides comprehensive IP address intelligence, including geolocation, network information, privacy detection, and abuse contacts, via an MCP server.
Demonstrates secure format-preserving encryption (FF3 FPE) and multi-mode authentication for sensitive data within LLM interactions.
Compares two JSON strings deeply and order-independently to identify all differences.
Provides a Model-Context-Protocol server to interact programmatically with a self-hosted Vaultwarden instance using the Bitwarden CLI.
Integrates Incode's identity verification services into AI assistants, enabling secure user authentication through natural language.
Enables AI assistants like Claude to conduct comprehensive security audits on Solidity smart contracts through integration with static analyzers and pattern matching.
Empowers AI agents with direct access to Shodan's internet intelligence for passive reconnaissance, vulnerability research, and device analysis.
Orchestrates 13 specialized AI agents to manage the full software development lifecycle from discovery to deployment.
Provides reversibility intelligence for actions across various platforms, helping users understand if actions can be undone.
Provides an AI-readable database of Croatian legislation, enabling advanced legal research and cybersecurity compliance.
Automates the creation of test files for projects written in TypeScript, JavaScript, Python, and Java.
Integrates AI assistants with One Identity Safeguard for Privileged Passwords to manage privileged access and credentials.
Intercepts and compresses shell command output by 60–90% for Claude Desktop, optimizing token usage and preventing prompt injection.
Provides programmatic access to internal data management tools for DataBridge Inc.
Facilitates DORA Articles 24-27 threat-led penetration testing lifecycle management with 10 specialized tools.
Safely recover forgotten SOL and optimize Solana account state by cleaning NFTs, sweeping dust, reclaiming rent, and more.
Captures and surfaces team knowledge, such as decisions and incidents, directly within code review workflows.
End of results