Execute network exploitation and post-exploitation operations using tools like nc, socat, scapy, or chisel to assess target systems and identify vulnerabilities.
108,650 tools. Last updated 2026-04-16 17:39
- Retrieve detailed exploitation data for a specific vulnerability incident using its unique identifier to determine if it has been exploited in the wild and identify the detection source.Apache 2.0
- Execute controlled exploitation attempts against identified vulnerabilities to validate security weaknesses during authorized penetration testing.
- Extract CSRF exploitation patterns from training data to identify security vulnerabilities in web applications.MIT
- Retrieve active exploitation data for specific vulnerabilities to assess risk, prioritize patching, and inform incident response decisions based on threat actor activity.Apache 2.0
- Execute web exploitation and analysis tools like curl, wget, php, or python3 to test web application security by targeting URLs with custom options.
Matching MCP Servers
- AsecurityFlicense-qualityEnables AI assistants to access the Consumer Rights Wiki, providing tools to search and retrieve information about modern consumer exploitation issues like privacy violations, dark patterns, and deceptive pricing practices.Last updated6
- -securityAlicense-qualityA server that retrieves CVE details from the NVD API and fetches EPSS scores to provide comprehensive vulnerability information, including descriptions, CWEs, CVSS scores, and exploitation likelihood percentiles.Last updated13MIT
Matching MCP Connectors
A server to provide information about EOxElements custom elements for coding agents.
Query and retrieve information about various adversarial tactics and techniques used in cyber atta…