Skip to main content
Glama

Oracle-42 DarkIntel MCP Server

Darknet threat intelligence MCP server powered by 12,000+ vectorized data points from IronClaw intelligence pipeline.

Tools (10)

Tool

Description

Data Points

threat_intel

Darknet threat intelligence

SOC alerts, forensic reports

actor_lookup

Threat actor profiles

2,800+ actors, ransomware groups

worm_scan

AI worm signatures

1,900+ self-replicating patterns

mining_detect

Stealth cryptomining detection

2,000+ mining signatures

traffic_scan

Traffic hijacking intel

2,100+ BGP/DNS/CDN patterns

code_vuln

Code supply chain attacks

1,400+ IDE/npm/CI patterns

breach_check

Breach & leak intelligence

Data breaches, leaked credentials

market_intel

Darknet marketplace intel

600+ indexed markets

defense_playbook

Defense playbooks

243 pre-built response procedures

social_engineering

Social engineering techniques

60+ advanced SE patterns

Usage

Claude Desktop / Cursor

{
  "mcpServers": {
    "oracle42-darkintel": {
      "url": "http://173.249.14.219:8420/sse"
    }
  }
}

stdio (local)

pip install mcp
python server.py

SSE (remote)

python server.py sse

Requirements

  • Python 3.10+

  • mcp SDK (pip install mcp)

  • Qdrant vector database (localhost:6333)

  • Ollama with nomic-embed-text model (localhost:11434)

License

Proprietary - Oracle-42 Project

-
security - not tested
F
license - not found
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/mintmas/oracle42-darkintel-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server