SeldomMaster
Provides tools to get the latest stories or search specific subreddits like r/blueteamsec and r/netsec.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@SeldomMasterlook up IP 45.33.32.156 on GreyNoise"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
SeldomMaster
cybersecurity MCP tools
a bunch of ones i use personally with Gemini CLI but should work with any LLM that supports MCP.
what's in the box?
see settings.json, add your API keys as needed, and install for your environment.
CTI use cases
hits a bunch of free or community APIs for cyber threat intelligence use cases
blockchain_mcp - explore the blockchain by ID and transaction
greynoise_mcp - community Greynoise API lookups
malpedia_mcp - leverage Malpedia
opencti_mcp - hit an OpenCTI server
otx_simple_mcp - query OTX by indicator, get passive DNS, etc
ransomware-live-mcp - hit the ransomware.live API
reddit_netsec_mcp - get the latest stories or search r/blueteamsec and r/netsec
xforce_mcp - hit IBM's XForce CTI stuff
yarahub-mcp - hit YaraHub
localhacker
ues a bunch of OSX tools to discover and hack devices on the local network, "nmap" is the only third-party dependency.
TODO
https://cveapi.com/
https://hashlookup.circl.lu/
This server cannot be installed
Maintenance
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/paralax/SeldomMonster'
If you have feedback or need assistance with the MCP directory API, please join our Discord server