Retrieve bug bounty programs accessible on HackerOne to identify eligible targets for security testing.
100,767 tools. Last updated 2026-04-05 23:10
- Generate business logic testing workflows for bug bounty programs to identify security vulnerabilities in web applications, APIs, mobile apps, or IoT systems.
- Perform Active Directory penetration testing to identify security vulnerabilities in domain controllers and network configurations.
- Create JavaScript payloads that ping your webhook when executed to detect blind XSS vulnerabilities during bug bounty testing.MIT
- Perform penetration testing on web applications to identify security vulnerabilities using configurable test types and depth levels for comprehensive security assessment.
- Generate penetration testing strategies by analyzing detected services, technologies, and vulnerabilities to create targeted security assessments.
Matching MCP Servers
- -securityFlicense-qualityA comprehensive MCP server for automated bug bounty hunting and security reconnaissance, featuring over 28 specialized tools for subdomain discovery, vulnerability scanning, and traffic analysis. It integrates automated scope validation and professional reporting across multiple platforms like HackerOne and Bugcrowd to streamline security testing.Last updated 6 months ago3
- -securityFlicense-qualityProvides penetration testing tools including nmap, nikto, sqlmap, wpscan, and exploit database searches for educational and authorized security testing purposes using Kali Linux tools.Last updated 6 months ago
Matching MCP Connectors
MCP server for static security analysis of Android source code
Your agent tests pages, copy, and flows on simulated users while you build.