Discover our curated collection of MCP servers for security & testing. Browse 2702 servers and find the perfect MCPs for your needs.
Enables AI-powered administration of Keycloak users and realms through the Model Context Protocol.
Provides enterprise-grade authentication management including secure credential storage, multi-protocol support, and real-time threat detection.
Provides access to Shodan's search engine for internet-connected devices and services via a Model Context Protocol (MCP) server.
Enables Claude to execute shell commands securely through the Model Context Protocol.
Performs open-source intelligence (OSINT) tasks leveraging common network reconnaissance tools.
Enables AI models to interact directly with your Okta environment using the Model Context Protocol (MCP).
Manages and interacts with mobile devices and simulators for iOS and Android development.
Exposes the Keycloak admin client as a Model-Context Protocol (MCP) server.
Connect AI assistants to cloud infrastructure data for natural language exploration and analysis.
Enables secure execution of shell commands with dynamic approval and audit logging.
Provides a suite of test servers implementing the Model Context Protocol (MCP).
Enables security administrators to manage their pfSense firewalls using natural language through AI assistants.
Access and retrieve Solodit vulnerability reports via a Model Context Protocol (MCP) server.
Provides fast, scriptable access to Windows `.evtx` logs through a Model Context Protocol server.
Aggregates multiple Model Context Protocol (MCP) servers, providing policy-based access control and on-demand tool discovery for agents to prevent context window bloat.
Secure AI agent interactions with a zero-trust gateway and vault that manages credentials, enforces access policies, and records audit trails.
Enables secure querying of Google NotebookLM from AI agents like Claude, fortified with 14 layers of security hardening.
Equip AI coding agents with instant, token-efficient, and accurate test coverage data from LCOV files to enhance code quality and testing efforts.
Orchestrates a comprehensive suite of security tools for automated vulnerability discovery, analysis, and exploitation.
Automates web application penetration testing by leveraging the full OWASP Web Security Testing Guide.
Scroll for more results...