114,426 tools. Last updated 2026-04-21 11:36
- View all AI outreach agents with their current status, platform, and last activity time to monitor automated client acquisition campaigns.MIT
- Create a new product or business profile for automated outreach campaigns by analyzing its website to understand value proposition and target audience.MIT
- Discover WCAG accessibility techniques to implement web content guidelines. Filter by technology like HTML, ARIA, or CSS and by type such as sufficient or failure techniques.
- Retrieve all automated email campaigns from your Apollo account to manage outreach workflows and track campaign status.MIT
- Retrieve detailed intelligence about specific threat actors or APT groups to understand their tactics, techniques, procedures, target sectors, and tools used for security research and incident analysis.Apache 2.0
- Add tools to agents in the Letta system by ID or name, automatically registering MCP tools when needed for enhanced functionality.MIT
Matching MCP Servers
- -securityFlicense-qualityAI-powered content generation for LinkedIn outreach, helping sales teams and recruiters craft personalized connection requests, InMails, posts, comments, and multi-touch outreach sequences. It's a content assistant that generates text for human review and manual sending, fully compliant with LinkedIn's Terms of Service.Last updated
- -securityAlicense-qualityMCP-ORTools integrates Google's OR-Tools constraint programming solver with Large Language Models through the MCP, enabling AI models to: Submit and validate constraint models Set model parameters Solve constraint satisfaction and optimization problems Retrieve and analyze solutionLast updated18MIT
Matching MCP Connectors
Provide your AI coding tools with token-efficient access to up-to-date technical documentation for…
Latin American data validation tools for AI agents. Validates Brazilian CPF, CNPJ and PIX keys, Mexican RFC, Chilean RUT, and provides public holidays for Brazil, Mexico and Chile.
- Discover all available tools for your tenant, including core and custom options, to identify which tools to enable or configure for your AI agents.MIT
- Create automated outreach campaigns with timed email sequences and multi-channel steps for sales prospecting and follow-up workflows.MIT
- Retrieve detailed product specifications including available placements, printing techniques, sizes, colors, and design requirements for Printful catalog items.MIT
- Send automated emails from an AI agent for notifications, reports, or messages. Integrates with ATXP-MCP server tools for agent communication.
- Search or list available MCP tools by capability. Use vector search with description parameter to find tools matching specific needs, or omit description to view all tools.
- Browse and filter AI-generated images and videos from Civitai by tags, models, tools, techniques, and content ratings. Sort results and apply NSFW filters to find specific visual content.MIT
- Initialize product creation and agent onboarding by providing product name and website URL to start automated outreach on Reddit.MIT
- Find businesses on Google Maps by type and location, with Lead Quality Scores and outreach hints for targeted prospecting.MIT
- Find statistical and machine learning tools for your data analysis needs. Search across 50+ tools using semantic queries to match your dataset or research question.MIT
- Automate outreach by creating products and deploying AI agents across recommended channels for businesses like coaches, agencies, real estate, recruitment, freelancers, or other types.MIT
- Create an AI outreach agent for LinkedIn, Email, X, Instagram, or Blog channels to automate client acquisition for specific products.MIT
- Find qualified sales leads on Google Maps filtered by Lead Quality Score to build targeted outreach lists for specific industries and locations.MIT
- Discover Context Engineering techniques for reasoning, workflow, code, or project tasks to identify the best tool for specific needs.MIT
- Scrape websites with strong anti-bot protection using advanced stealth techniques like undetected browser automation, randomized behavior patterns, and human-like interactions to avoid detection.MIT
- Discover available prompt engineering techniques with acceptance statistics to enhance AI interactions through optimized method selection.MIT
- Identify MITRE ATT&CK techniques that target specific ICS assets by providing the asset's STIX ID, enabling focused threat analysis and security assessment.
- Load expert-crafted workflows and best practices to guide AI assistants through proven techniques for coding tasks, accessing community and custom skills.MIT
- Identify ATT&CK techniques associated with specific malware or software by providing its STIX ID, enabling threat analysis and security research.
- Identify top customers by spending or loyalty points for targeted VIP outreach and marketing campaigns in your art supply business.
- Retrieve MITRE ATT&CK techniques associated with a specific tactic to analyze adversary behaviors and enhance threat intelligence.
- Identify MITRE ATT&CK techniques detected by a specific data component to analyze security monitoring coverage and detection capabilities.
- Retrieve revoked techniques from the MITRE ATT&CK framework to identify outdated or deprecated attack methods for accurate threat analysis.
- Identify techniques used by threat group software to analyze attack patterns and enhance security monitoring.
- Retrieve all Smart Delivery tests (manual or automated) with pagination controls to manage email marketing campaign testing data.
- Retrieve all MITRE ATT&CK techniques across enterprise, mobile, or ICS domains to support threat analysis and security research.
- Identify which ATT&CK techniques a specific mitigation can counter by providing its STIX ID and domain, helping security teams assess defensive coverage.
- Convert Product Requirements Documents into Architectural Decision Records using advanced AI prompting techniques for optimized technical documentation.MIT
- Retrieve WCAG techniques, including sufficient methods, advisory guidance, and common failures, for any specific success criterion to implement accessibility requirements.
- Retrieve all parent techniques from the MITRE ATT&CK framework to analyze threat relationships and understand attack patterns across enterprise, mobile, or ICS domains.
- Retrieve MITRE ATT&CK techniques filtered by platform (Windows, Linux, etc.) and domain for threat analysis and security research.
- View sent outreach emails to recruiters and referrers, filter by job application, and manage email tracking for job applications.MIT
- Analyze patterns in Bitcoin Stamps to identify common libraries, frameworks, and coding techniques used across the ecosystem.MIT
- Send outreach emails to recruiters or referrers for job applications using your configured email address.MIT
- Modify automated rules for Meta ad campaigns by updating conditions, actions, schedule, or status to maintain campaign optimization.MIT
- Set up automated workflows in Helios-9 project management that execute actions when specific events occur, such as task completion or deadline approaches.MIT
- Retrieve MITRE ATT&CK tactics and techniques for threat analysis to understand attack patterns and improve security response.
- Retrieve comprehensive accessibility guidance for WCAG success criteria, including techniques, test rules, and glossary terms to implement web accessibility standards.
- Search WCAG accessibility techniques by keyword to find implementation methods for web accessibility compliance.
- Identify MITRE ATT&CK techniques employed in specific cyber campaigns by analyzing campaign STIX IDs across enterprise, mobile, or ICS domains to support threat intelligence analysis.
- Record outreach activities in your revenue pipeline by tracking communication channels, responses, and follow-up notes for lead management.
- Remove automated rules from Meta ad campaigns to manage campaign automation and control ad delivery settings.MIT
- Build website authority through link building and digital PR strategies including outreach and guest posts to improve search rankings.MIT
- Test web applications for Cross-Site Request Forgery vulnerabilities using multiple techniques including token bypass and method manipulation to identify security weaknesses.MIT
- Expand story text to meet target length requirements by applying narrative enhancement techniques for improved content development.ISC
- Enhance story pages by expanding text with customizable techniques including environmental details, action scenes, and prose smoothing to improve narrative quality.ISC