Neo4j is a graph database management system developed by Neo4j, Inc. It is a native graph database that stores data in nodes connected by relationships, providing an efficient way to query connected data.
Why this server?
Can be combined with Neo4j MCP server as mentioned in the tutorial for building a knowledge graph assistant
Why this server?
Exposes platform standards and architectural guidelines for using Neo4j to implement agent memory systems.
Why this server?
Provides memory and knowledge graph operations using Neo4j database, including adding memories, searching entities and relationships, managing episodes, and querying historical data through natural language interfaces.
Why this server?
Integrates with Neo4j graph database to provide graph-based context expansion and relationship-focused document retrieval capabilities
Why this server?
Provides integration between Neo4j graph database and Claude Desktop, enabling graph database operations through natural language interactions. It allows executing Cypher queries, creating nodes and relationships, and performing complex graph operations via natural language commands.
Why this server?
Enables AI assistants to use Neo4j knowledge graphs as dynamic instruction manuals and project memory for standardized coding workflows, research analysis, and knowledge management with hybrid reasoning capabilities combining structured graph data with semantic search.
Why this server?
Provides tools for interacting with RushDB, a property-centric graph database built on Neo4j. Enables ingesting JSON/CSV data, performing graph traversals, aggregations, vector similarity searches, and schema discovery through a unified JSON search interface.
Why this server?
Extends Neo4j databases with vector search, fulltext search, and the ability to execute read-only Cypher queries for GraphRAG applications.
Why this server?
Enables querying and analysis of BloodHound Community Edition data through its REST API and Cypher queries, providing tools for Active Directory attack path analysis, user/group/computer assessment, privilege escalation identification, and security principal relationship mapping.