ExploitDB
About
Discover the full potential of cybersecurity research with seamless access to ExploitDB features through the Model Context Protocol (MCP). Conduct targeted exploit queries based on keywords, CVE IDs, or platforms while benefiting from local database caching to enhance threat intelligence and vulnerability analysis.
Explore Similar MCP Servers
Metasploit Framework
Elevate your cybersecurity arsenal with a robust interface that seamlessly integrates with the powerful capabilities of the Metasploit Framework. This tool facilitates secure exploit execution, streamlined payload generation, effective session management, and advanced post-exploitation maneuvers, empowering security experts in their assessments.
CVE-Search
Access vulnerability data from the Common Vulnerabilities and Exposures (CVE) database seamlessly by leveraging the connectivity with the CVE-CIRCL API. Ideal for security assessments, patch validations, and in-depth security research.
BloodHound
Enhance your security posture by leveraging advanced tools that seamlessly connect with BloodHound for in-depth analysis of Active Directory and Azure systems. Identify potential attack vectors, elevate privilege levels, and pinpoint security flaws with specialized solutions tailored for threat detection and penetration testing.
MySQL Database Explorer
Explore MySQL database schemas and run SELECT queries securely using Model Context Protocol (MCP). Benefit from safeguards against SQL injection, query timeouts, and row limits for a protected browsing experience.
Vulnerability Intelligence
Empower security experts with advanced tools for analyzing vulnerabilities, including CVE search, CVSS scoring, exploit verification, and incident timeline monitoring, leveraging the National Vulnerability Database for curated data.
Solodit
Explore a cutting-edge Model Context Protocol (MCP) that seamlessly interacts with Solodit's robust vulnerability repository, enabling swift access to comprehensive smart contract security audit results. Uncover detailed vulnerability assessments that encompass impact severity, audit agency particulars, and in-depth technical insights crucial for conducting thorough security evaluations and analyses.
NVD (National Vulnerability Database)
Gain entry to the NIST National Vulnerability Database using specialized tools like get_cve and search_cve. These tools enable users to retrieve and explore CVE entries with flexible search parameters for tailored results.
DevDB
Gain access to database tables and schemas effortlessly through HTTP endpoints, enabling secure database structure querying without the need for direct database entry.
Endor Labs
Enhance your development process with seamless real-time vulnerability detection, dependency scanning, and security analysis by leveraging the Model Context Protocol (MCP) in conjunction with the Endor Labs security platform. Access these essential features effortlessly within your development environments using the intuitive endorctl CLI tool.
Cursor DB Explorer
Gain access to Cursor IDE's SQLite databases to delve into project details, chat logs, and composer data via an API that autonomously identifies setups and offers organized resources for in-depth examination and evaluation.
PostgreSQL Explorer
Discover and interact with PostgreSQL databases securely through a Model Context Protocol, enabling schema exploration and query execution. Easily deployable using Docker or NPX for secure data analysis without altering the database.
BloodHound
Unlocks the capability for security experts to assess Active Directory and Azure AD setups using conversational queries, leveraging integration with BloodHound's Neo4j repository to pinpoint potential attack routes and security weaknesses.
OSV Database API
Discover security flaws in software packages by connecting to the OSV Database API. Access CVE details, determine impacted versions, and find solutions.
Offensive Security Toolkit
Empowers cybersecurity experts with dedicated servers for generating payloads, conducting reconnaissance, building shellcodes, and monitoring security, enhancing their penetration testing capabilities.
SQLite Explorer
Unlock the potential of SQLite databases with seamless data querying and analysis using SQL commands through the Model Context Protocol (MCP). Gain valuable insights and facilitate data exploration without the need for direct database interactions.