Skip to main content
Glama

Information about exploitation MCP tools

Production-ready MCP servers that extend AI capabilities through file access, database connections, APIs, and contextual services.

45,998 tools. Last updated 2025-12-20 02:06
  • Retrieve detailed exploitation data using a unique identifier to determine if a vulnerability has been exploited in the wild, including detection source, timeframe, and method.
    MIT License
  • Retrieve active exploitation data for a specific vulnerability to assess risk, prioritize remediation, and inform incident response. Input a CVE ID or UUID to access timestamps, detection methods, and exploitation frequency.
    MIT License
  • Execute controlled exploitation of identified vulnerabilities to validate security weaknesses during authorized penetration testing.
  • Retrieve exploitation data to identify vulnerabilities actively exploited in the wild, including detection signatures, frequency, and timeframes. Filter and sort by count, creation, or update time for actionable insights.
    MIT License
  • Retrieve detailed information about the authenticated user to enable personalized interactions within the HackMD platform.
    MIT License

Interested in MCP?

Join the MCP community for support and updates.

RedditDiscord

Matching MCP servers

  • A
    security
    F
    license
    A
    quality
    Enables AI assistants to access the Consumer Rights Wiki, providing tools to search and retrieve information about modern consumer exploitation issues like privacy violations, dark patterns, and deceptive pricing practices.
    Last updated 5 months ago
    6
    • Apple
  • -
    security
    A
    license
    -
    quality
    A server that retrieves CVE details from the NVD API and fetches EPSS scores to provide comprehensive vulnerability information, including descriptions, CWEs, CVSS scores, and exploitation likelihood percentiles.
    Last updated 7 months ago
    12
    MIT License