Discover our curated collection of MCP servers for security & testing. Browse 2702 servers and find the perfect MCPs for your needs.
Enables secure command-line execution with validation for LLM applications.
Enables Claude to perform security scans on Terraform code, visualize AWS cloud architectures, and execute Terraform commands.
Evaluates GitHub feature integration with the Aegis Framework using the Model Context Protocol (MCP) server.
Provides comprehensive tools for integrating with the BugBug test automation platform via a Model Context Protocol (MCP) server.
Manages secrets, DFC keys, and other resources within Thales CipherTrust Secrets Management via the Model Context Protocol.
Provides a remote endpoint for validating MCP server interactions.
Provides an MCP server integrating intelligent web search, local AI processing, and robust OAuth2 authentication over HTTP.
Integrates AI assistants with SonarQube to enable natural language interaction for code quality analysis, project management, and security insights.
Provides advanced property-based fuzzing and testing capabilities for Model Context Protocol servers, enabling automated discovery of edge cases and bugs in Python functions.
Provides AI agents with episodic memory and architectural awareness to prevent context loss in long-running development workflows.
Generates comprehensive performance test plans from OpenAPI specifications using intelligent analysis.
Analyzes technology ecosystem dynamics, platform competition, API dependencies, developer adoption, and tech stack risks.
Provides a Burp Suite Montoya API documentation query server powered by FastAPI and the Model Context Protocol.
Classifies IP addresses as internet background noise, benign services, or potentially targeted attack traffic using the GreyNoise API.
Dissects Modbus/TCP and BACnet/IP traffic from saved OT/ICS packet captures to generate structured JSON containing decoded transactions and a basic device inventory.
Automates the extraction, analysis, and comparison of firmware images to identify security-relevant files and architectural details.
Collects and returns a list of reference materials for a given CVE ID to aid in creating CVE guides.
Bridge sandboxed environments with whitelisted host CLI commands through a secure, direct execution layer.
Provides immutable, hash-chained audit logging for AI agents to ensure data integrity and facilitate compliance with regulations like the EU AI Act.
Analyzes tech ecosystems for AI agents and LLM workflows by mapping technology relationships, tracking adoption, detecting CVEs, and scoring tech stack risk across six live data sources.
Scroll for more results...