Skip to main content
Glama
108,650 tools. Last updated 2026-04-16 17:39
  • Execute network exploitation and post-exploitation operations using tools like nc, socat, scapy, or chisel to assess target systems and identify vulnerabilities.
  • Retrieve detailed exploitation data for a specific vulnerability incident using its unique identifier to determine if it has been exploited in the wild and identify the detection source.
    Apache 2.0
  • Execute controlled exploitation attempts against identified vulnerabilities to validate security weaknesses during authorized penetration testing.
  • Execute web exploitation and analysis tools like curl, wget, php, or python3 to test web application security by targeting URLs with custom options.

Matching MCP Servers

  • A
    security
    F
    license
    -
    quality
    Enables AI assistants to access the Consumer Rights Wiki, providing tools to search and retrieve information about modern consumer exploitation issues like privacy violations, dark patterns, and deceptive pricing practices.
    Last updated
    6
    • Apple
  • -
    security
    A
    license
    -
    quality
    A server that retrieves CVE details from the NVD API and fetches EPSS scores to provide comprehensive vulnerability information, including descriptions, CWEs, CVSS scores, and exploitation likelihood percentiles.
    Last updated
    13
    MIT

Matching MCP Connectors

  • A server to provide information about EOxElements custom elements for coding agents.

  • Query and retrieve information about various adversarial tactics and techniques used in cyber atta…