Descubre nuestra colección curada de servidores MCP para security & testing. Explora 1594 servidores y encuentra los MCP perfectos para tus necesidades.
Integrates Shodan's powerful search and intelligence capabilities into applications.
Documents and analyzes LLM safety challenges within the Grey Swan Arena competitions.
Provides AI agents with a verified 'Hardware Sandbox' for C++, Rust, and Go, revealing the low-level essence of high-level code through autonomous assembly analysis, security hardening audits, and polyglot cross-compilation.
Provides secure, permission-controlled access to Firebase Firestore databases for AI assistants and MCP clients.
Scans web pages and entire websites to identify and report broken links.
Enables AI agents to issue and manage verifiable credentials within a Self-Sovereign Identity (SSI) ecosystem.
Adapt any HTTP API into a Model Context Protocol (MCP) toolset for AI agent interaction.
Enables an MCP server to control a web browser for automated testing.
Performs comprehensive TLS certificate analysis and security assessment.
Provides a hobbyist-level MCP server for Vault using Python.
Detects personally identifiable information (PII) within data.
Synchronizes AI assistants with accurate and secure time information from Network Time Protocol servers.
Enables the construction of remote MCP servers featuring robust authentication and authorization capabilities via OAuth2.1.
Exposes Binary Ninja's reverse engineering capabilities to LLM clients via the Model Context Protocol.
Exposes Metasploit Framework capabilities through a Model Context Protocol (MCP) server for streamlined security testing and integration.
Generates mock data for various application development and testing scenarios.
Empowers AI assistants to interact with AWS CLI, enabling command execution and documentation retrieval through the Model Context Protocol.
Performs axe accessibility scans on specified URLs utilizing Playwright for browser automation.
Analyzes transactions for fraud using advanced models, providing insights and risk scores to enhance investigation efficiency.
Extracts structured information like timelines, actions, entities, and severity from unstructured incident response logs.
Scroll for more results...