Why this server?
A Model Context Protocol tool for analyzing code repositories, performing security scans, and assessing code quality across multiple programming languages, relevant to penetration testing.
Why this server?
A secure MCP server for executing whitelisted shell commands with resource and timeout controls, designed for integration with Claude and other MCP-compatible LLMs. Useful for executing commands in a pentest engagement.
Why this server?
A Model Context Protocol (MCP) server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.
Why this server?
A demonstration server that allows large language models to perform penetration testing tasks autonomously by interfacing with the Mythic C2 framework.
Why this server?
A connectivity testing server that enables DICOM network operations (like C-ECHO) through Claude's Model Context Protocol, with support for node configuration management. Useful for pentesting DICOM environments.
Why this server?
MCP server for querying the Shodan API and Shodan CVEDB. This server provides tools for IP lookups, device searches, DNS lookups, vulnerability queries, CPE lookups, and more.