A Model Context Protocol (MCP) server for querying the CVE-Search API
☆88Jul 26, 2025Updated 7 months ago
Alternatives and similar repositories for cve-search_mcp
Users that are interested in cve-search_mcp are comparing it to the libraries listed below
Sorting:
- All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI age…☆188Sep 17, 2025Updated 5 months ago
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆13Oct 28, 2025Updated 4 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- Research browsers☆48Jan 9, 2026Updated 2 months ago
- MCP server for VirusTotal API — analyze URLs, files, IPs, and domains with comprehensive security reports, relationship analysis, and pag…☆112Mar 3, 2026Updated last week
- Search for Common Platform Enumeration (CPE) strings using software names and titles.☆24Updated this week
- Tellix is a conversational recon interface powered by httpx and LLMs. Just ask.☆25Apr 22, 2025Updated 10 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- ☆21Feb 24, 2026Updated 2 weeks ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- Decrypt TP-Link Firmware☆73Oct 5, 2025Updated 5 months ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 8 months ago
- MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works …☆114Mar 3, 2026Updated last week
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- ☆72May 15, 2023Updated 2 years ago
- WebSocket and SQL Injection Exploit Script☆40Feb 27, 2025Updated last year
- ☆41Mar 12, 2025Updated 11 months ago
- ☆17Feb 20, 2026Updated 2 weeks ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Imports events from remotely-located iCalendar files into The Events Calendar plugin for WordPress.☆10Jun 26, 2025Updated 8 months ago
- A Model Context Protocol (MCP) implementation that enables Claude Desktop to interact with Azure services. This integration allows Claude…☆16Jul 3, 2025Updated 8 months ago
- Automate research and outbound lead generation.☆15May 18, 2025Updated 9 months ago
- A Sensor Streamer for Android Wear OS☆14Feb 9, 2024Updated 2 years ago
- OpenPGP in Python using Sequoia PGP☆18Feb 25, 2026Updated last week
- ☆11Sep 6, 2024Updated last year
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- A tool to make the syslog output from Audiocodes SBC devices more searchable and readable☆11Jan 26, 2025Updated last year
- Ansible playbook to license the NGFW, install content updates, and install the required software version☆13May 6, 2024Updated last year
- MinuteTimers: A simple, free and beautiful online timer.☆12Jan 14, 2025Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- Collect paper metadata and abstract.☆16Feb 8, 2026Updated last month
- ☆17Feb 3, 2026Updated last month
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Jan 16, 2025Updated last year
- ☆14Feb 26, 2025Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month