发现我们为 security & testing 精心策划的 MCP 服务器集合。浏览 3231 个服务器,找到满足您需求的完美 MCP。
Performs real-time security scans on codebases for AI agents and LLM-powered IDEs.
Checks if provided context is safe by identifying potential code injection or harmful content.
Provides an auto-generated server for interacting with the Google Access Context Manager API via Multi-Agent Conversation Protocol (MCP).
Exposes Ghidra's core functionality as an MCP server, enabling Large Language Models to autonomously reverse engineer applications.
Provides advanced QB64PE programming assistance through a Model Context Protocol server.
Facilitates seamless, production-ready integration with the Secret Network blockchain through the Model Context Protocol.
Provides a unified server for diverse Abstract API services, offering comprehensive data validation, geolocation, timezone, and web utilities through a single API key.
Scans web pages and entire websites to identify and report broken links.
Manages tasks with secure OAuth 2.1 JWT authentication and optimized workflow, facilitating efficient user and task management across devices.
Manages extremely large contexts (10M+ tokens) for AI models using intelligent chunking, sub-queries, and free local inference via Ollama.
Integrates AI agents with yamory vulnerability management, enabling queries for detected issues, severity, and remediation guidance.
Enables AI assistants to fully control a Tracecat SOAR platform instance using natural language.
Facilitates controlled SSH command execution and remote configuration inspection via an OAuth-protected server.
Control and manage VMware Workstation virtual machines on Linux systems programmatically.
Provides a CVE database and vulnerability intelligence for AI agents.
Secures sensitive keys and infrastructure for agentic AI applications with a zero-trust secret management ecosystem.
Provides a secure local sandbox environment for AI agents to execute code, interact with desktops, and manage files using Docker or Windows Sandbox backends.
Inspects and analyzes log data on Unix-flavored systems without modifying original sources.
Offers a suite of security intelligence tools for professionals, ranging from vulnerability classification to threat model generation.
Provides AI agents with cryptographic identity, trust verification, and tamper-evident interaction logging capabilities.
Scroll for more results...