Why this server?
This server directly integrates the Metasploit Framework, the leading tool for penetration testing and exploitation, enabling the discovery and exploitation of security risks on target systems, including web application vulnerabilities.
-securityAlicense-qualityProvides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.Last updated 2 months ago563Apache 2.0Why this server?
This server provides access to common Kali Linux penetration testing commands (such as those used for SQL injection and command execution) specifically for finding security vulnerabilities in web applications.
AsecurityFlicense-qualityA tool that allows penetration testing through Kali Linux commands executed via a Multi-Conversation Protocol server, supporting security testing operations like SQL injection and command execution.Last updated 7 months ago553Why this server?
BurpSuite is the industry-standard tool for web application security testing and is essential for finding most common website vulnerabilities and security risks.
-securityAlicense-qualityBurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp's core functionalities.Last updated a year ago74MITWhy this server?
This server integrates core penetration testing utilities like Nmap and Nikto, which are used to scan networks and websites for open ports and known vulnerabilities, fulfilling the request to discover security risks.
AsecurityAlicense-qualityA Model Context Protocol server that integrates essential penetration testing tools (Nmap, Gobuster, Nikto, John the Ripper) into a unified natural language interface, allowing security professionals to execute and chain multiple tools through conversational commands.Last updated 14 days ago968130MITWhy this server?
Provides secure execution of web-focused Kali Linux tools (like Nmap, SQLMap, and Nikto) in a controlled environment, making it highly relevant for web penetration testing tasks.
-security-license-qualityProvides secure access to Kali Linux penetration testing tools including nmap, nikto, dirb, wpscan, and sqlmap for educational vulnerability assessment on whitelisted targets. Runs in a controlled Docker environment and includes reconnaissance capabilities for authorized security testing.Last updated 6 months ago1Why this server?
This tool helps discover security risks by autonomously interacting with web apps, capturing network traffic, and collecting console errors, providing diagnostics essential for identifying exploitable flaws.
AsecurityAlicense-qualityUnleashes LLM-powered agents to autonomously execute and debug web apps directly in your code editor, with features like webapp navigation, network traffic capture, and console error collection.Last updated 2 months ago21,236Apache 2.0Why this server?
This service is designed for comprehensive security scanning, enabling the detection of code-level vulnerabilities, dependency issues, and secrets within the codebase supporting the website.
-securityAlicense-qualityEnables comprehensive security scanning of code repositories to detect secrets, vulnerabilities, dependency issues, and configuration problems. Provides real-time security checks and best practice recommendations to help developers identify and prevent security issues.Last updated 8 months ago22MITWhy this server?
This server is based on the Garak vulnerability scanner, specifically designed to identify potential security flaws and data leakage risks within large language model (LLM) applications and integrations, often deployed in web contexts.
Why this server?
This server focuses on ethical security testing, offering tools for subdomain enumeration and network analysis, which are critical preparatory steps for penetration testing and discovering exposed assets.
-securityAlicense-qualityIntegrates OWASP ZAP security testing with AI assistants through MCP, enabling automated vulnerability scanning and AI-powered security analysis during development. Supports multiple scan types including active, passive, and AJAX spider scans with real-time status updates.Last updated 3 months ago5MIT