MCPServers
ExploitDB - MCP server logo
4
0

Summary

A Model Context Protocol server developed by Cyreslab.ai that provides AI assistants with access to ExploitDB functionality for cybersecurity research. The server enables searching for security exploits by keywords, CVE IDs, or platforms, retrieving detailed information about specific exploits including their code, and tracking newly added vulnerabilities. It maintains a local SQLite database that can be automatically updated from the official ExploitDB repository, making it valuable for threat intelligence, vulnerability research, and security analysis without leaving the AI assistant conversation.

Available Actions(5)

search_exploits

Search for exploits in the database. Parameters: query (string), platform (optional string), limit (optional integer), type (optional string), cve (optional string), author (optional string), start_date (optional string), end_date (optional string), verified (optional boolean), offset (optional integer)

get_exploit

Retrieve detailed information about a specific exploit. Parameters: id (integer), include_code (boolean)

find_by_cve

Find all exploits related to a specific CVE. Parameters: cve (string), limit (optional integer)

get_recent_exploits

Retrieve recently added exploits. Parameters: limit (optional integer)

get_statistics

Get insights about the exploits in the database. Parameters: none

Last Updated: April 17, 2025

社区评论

0.0
0 条评论
5
0
4
0
3
0
2
0
1
0

暂无评论. 成为第一个评论的人!

登录以参与讨论

Coming soon to
HighlightHighlight AI

语言

TypeScript

分类

标签