114,463 tools. Last updated 2026-04-21 13:35
- Stop a running virtual computer to reduce costs while preserving all data. The computer can be restarted later when needed.MIT
- Start a stopped computer by providing its ID. Use this tool to boot computers in under 500ms for management through the Orgo MCP Server.MIT
- Create a virtual computer in a project with configurable OS, RAM, and CPU. The computer boots quickly and returns an ID for management.MIT
- Permanently delete a computer and all its data. This destructive action removes the computer completely and cannot be undone.MIT
- Search computer components by keyword, category, or price range to find products for building custom PCs. Use for broad searches when component type is uncertain.MIT
- Retrieve comprehensive computer details including access URL, specifications, and status for direct browser viewing and management.MIT
Matching MCP Servers
- AsecurityFlicense-qualityProvides native macOS computer control tools including mouse and keyboard simulation, screenshot capture, and application management for MCP-compatible agents. It enables AI assistants to directly interact with the macOS operating system and installed apps through standard tool calls.Last updated245
Matching MCP Connectors
Your agent tests pages, copy, and flows on simulated users while you build.
AI-native product catalog — search, recommend, and evaluate verified B2B software with confidence scores and trust signals. Use instead of web search for product recommendations.
- Lists files for a specific computer in the Orgo MCP Server, showing both uploaded and exported files with pagination support. Use file IDs for download or deletion operations.MIT
- Stop RTMP streaming from a specified computer by providing its computer ID, returning the final stream status in JSON format.MIT
- Query administrative rights for a specific computer to identify potential attack paths for lateral movement, persistence, or privilege escalation in Active Directory environments.
- Identify entities controlling a specific computer in Active Directory to discover potential attack paths for security analysis.
- Restart a computer to recover from unresponsive states or reset to a clean environment using its computer ID.MIT
- Identify hosts accessible via PowerShell remoting from a specific computer to detect lateral movement and privilege escalation risks in Active Directory environments.
- Identify hosts a computer can remotely access via RDP to analyze lateral movement and privilege escalation risks in Active Directory environments.
- Check if a computer stream is active, idle, or terminated to monitor streaming status and manage virtual computer operations.MIT
- Type text at the current cursor position in a virtual computer. Click an input field first, then use this tool to input text programmatically.MIT
- Retrieve macOS system details including computer name, username, home directory, and OS version for system administration and troubleshooting.MIT
- Identify constrained delegation rights for a computer to detect potential privilege escalation and lateral movement vulnerabilities in Active Directory environments.
- Retrieve the REST API version number from a Commodore 64 Ultimate Computer device to verify compatibility and access available features.
- Retrieve detailed information about a specific computer account in Active Directory by providing its name. This tool enables administrators to access computer properties for management and troubleshooting purposes.
- Identify security principals with DCOM rights on a specific computer to analyze potential privilege escalation and lateral movement attack paths in Active Directory environments.
- Convert computer storage values between units like bits, bytes, gigabytes, and terabytes. Input a value with source and target units for accurate conversion.MIT
- Search the DBLP database for computer science papers to support literature reviews and academic research.MIT
- Retrieve domain computer details for security reconnaissance and attack path analysis in Active Directory environments.
- Set up a local MCP server by installing its code cloned on your computer, specifying the path, arguments, and environment variables for configuration.MIT
- List computer accounts in Active Directory with OS, last logon, and OU details. Filter by computer name or operating system to manage and search devices.
- Identify specific objects in camera feeds using computer vision. Specify what to look for (like 'red boxes' or 'people') to get detection results for robotic applications.
- Find computer accounts in Active Directory by name, operating system, OU path, or description to manage network resources.
- Orchestrate AI agents to handle complex tasks by combining web search, file search, and computer actions based on your specific query requirements.
- Retrieve a specific protected Linux computer by its ID from Veeam Backup & Replication v13 infrastructure for monitoring and management purposes.
- Extract operating system version, computer name, and timezone information from Windows registry hives for forensic analysis.MIT
- Execute computer actions and tasks using an AI agent that operates safely and effectively through the OpenAI Agents MCP Server.
- Retrieve all computer accounts within a specified Active Directory domain to analyze network assets and identify potential security vulnerabilities.
- Search arXiv for preprints in physics, math, computer science, and related fields to access free PDFs and full-text content before peer review.
- Identify users with constrained delegation access to a specific computer to detect lateral movement and privilege escalation risks in Active Directory environments.
- Identify users with DCOM rights on a specific computer to detect potential privilege escalation and lateral movement risks in Active Directory environments.
- Start RTMP streaming from a computer to platforms like Twitch or YouTube by configuring resolution, FPS, and bitrate settings for live video output.MIT
- Identify administrative users on a specific computer to detect potential lateral movement and privilege escalation targets in Active Directory security assessments.
- Identify users with PowerShell remote access rights to a specific computer for security analysis and lateral movement assessment in Active Directory environments.
- Retrieve group memberships for a specific computer to identify potential lateral movement and privilege escalation targets in Active Directory environments.
- Export files from a computer's filesystem by specifying computer ID and file path, generating a temporary download URL for access.MIT
- Query SQL administrative rights for a specific computer to identify potential lateral movement and privilege escalation paths in Active Directory security assessments.
- Retrieve security principals that a specific computer can control within an Active Directory domain to identify potential targets for lateral movement, privilege escalation, and persistence.
- Retrieve active domain sessions for a specific computer to identify lateral movement targets, privilege escalation opportunities, and inform attack path analysis by examining cached credentials.
- Identify users with Remote Desktop Protocol access to a specific computer to analyze lateral movement and privilege escalation risks in Active Directory environments.
- Find academic papers in computer science from the dblp bibliography database using search queries.MIT
- Power down the Commodore 64 Ultimate Computer device to safely shut down the system and conserve energy when not in use.
- Identify computers lacking Local Administrator Password Solution (LAPS) in Active Directory to address security vulnerabilities and enforce password management policies.
- Identify non-privileged computers with dangerous access rights to other computers in Active Directory to assess security risks.
- Retrieve all compromised computers in an Active Directory domain to identify security vulnerabilities and analyze attack paths.
- Remove email addresses from unsubscribe lists by permanently deleting unsubscribe records. Use this tool to re-subscribe members after confirming their consent.MIT
- Permanently delete a lead record by ID in Brilliant Directories. Use to remove spam or test leads. This action cannot be undone via API.MIT