Why this server?
Enables interaction with enterprise security platforms (SIEM, EDR, MISP) for threat intelligence, security monitoring, and analysis, crucial for detection and response phases of the cyber kill chain.
-securityFlicense-qualityA comprehensive implementation of Model Context Protocol servers enabling natural language interactions with security platforms including Splunk SIEM, CrowdStrike EDR, and Microsoft MISP for threat intelligence querying and analysis.Last updated2321Why this server?
Provides access to a suite of common penetration testing tools for reconnaissance, vulnerability scanning, and API testing, addressing initial phases of the cyber kill chain.
-securityFlicense-qualityAn MCP server that integrates various penetration testing tools, enabling security professionals to perform reconnaissance, vulnerability scanning, and API testing through natural language commands in compatible LLM clients like Claude Desktop.Last updated6Why this server?
Integrates with Metasploit Framework, offering tools for exploitation, payload generation, and post-exploitation activities, directly mapping to the exploitation and installation phases.
-securityAlicense-qualityEnables secure integration with Metasploit Framework for AI assistants, providing comprehensive access to penetration testing tools, module management, payload generation, and database operations. Designed for authorized security testing and defensive analysis with 28 specialized tools covering complete MSF functionality.Last updated7MITWhy this server?
Allows execution of Kali Linux commands for various security testing operations like SQL injection and command execution, providing broad utility across different attack phases.
AsecurityFlicense-qualityA tool that allows penetration testing through Kali Linux commands executed via a Multi-Conversation Protocol server, supporting security testing operations like SQL injection and command execution.Last updated553Why this server?
Facilitates network discovery and vulnerability scanning using Nmap, which is fundamental for the reconnaissance and weaponization phases.
Why this server?
Enables AI-powered packet analysis and threat detection using Wireshark, vital for network reconnaissance (offensive) and monitoring/analysis (defensive).
-security-license-qualityEnterprise network analysis platform that enables AI-powered packet analysis, threat detection, and network security capabilities through Claude Desktop integration.Last updated1Why this server?
Provides search and retrieval of security exploits and vulnerabilities from Exploit Database, supporting the weaponization and exploitation phases.
-securityAlicense-qualityA Model Context Protocol server that enables AI assistants to search and retrieve information about security exploits and vulnerabilities from the Exploit Database, enhancing cybersecurity research capabilities.Last updated19MITWhy this server?
Offers tools for reverse engineering and binary analysis using IDA Pro, essential for understanding malware (weaponization/installation) and custom application vulnerabilities.
AsecurityAlicense-qualityA Model Context Protocol server that enables AI assistants to interact with IDA Pro for reverse engineering and binary analysis tasks.Last updated1297MITWhy this server?
Enables YARA rule-based threat analysis on files and URLs, which is crucial for the detection and analysis phases of the cyber kill chain.
-securityAlicense-qualityA Model Context Protocol server that enables AI assistants to perform YARA rule-based threat analysis on files and URLs, supporting comprehensive rule management and detailed scanning results.Last updated22MIT