MCP Exploit-DB Server
Provides access to the Exploit-DB database through the searchsploit tool, enabling AI assistants to search for exploits by keywords or CVE identifiers, retrieve exploit content, and manage the local exploit database.
README
MCP Exploit-DB Server
An MCP (Model Context Protocol) server that provides access to the Exploit-DB database using the searchsploit command-line tool. This allows AI assistants like Claude to search for and retrieve exploit information directly.
Prerequisites
- Python 3.10 or higher
searchsploitcommand-line tool (from exploitdb package)
Installing searchsploit
On Kali Linux / Debian-based systems:
sudo apt update
sudo apt install exploitdb
On macOS with Homebrew:
brew install exploitdb
Installation on Claude Code and Desktop
- Clone or download the repository:
claude mcp add --transport stdio exploitdb -- venv/bin/python exploit_db/server.py
After updating the configuration claude_desktop_config.json, restart Claude Desktop (see sample file in the repo).
{
"mcpServers": {
"exploitdb": {
"command": "/ABSOLUTE/PATH/TO/PARENT/FOLDER/venv/bin/python",
"args": ["-m", "exploit_db.server"]
}
}
}
Available Tools
1. search_exploits
Search for exploits using keywords.
Parameters:
terms(required): Array of search terms (e.g.,["afd", "windows", "local"])case_sensitive(optional): Perform case-sensitive search (default: false)exact(optional): Exact match on exploit title (default: false)strict(optional): Strict version matching (default: false)title_only(optional): Search only in titles, not paths (default: false)exclude(optional): Exclude terms from results (use | to separate)json_output(optional): Return JSON format (default: false)show_urls(optional): Show web URLs instead of local paths (default: false)
Example:
Search for Windows local privilege escalation exploits related to afd.sys
2. search_cve
Search for exploits by CVE identifier.
Parameters:
cve(required): CVE identifier (e.g., "2021-44228" or "CVE-2021-44228")json_output(optional): Return JSON format (default: false)
Example:
Find exploits for CVE-2021-44228
3. get_exploit_path
Get the full local filesystem path to an exploit.
Parameters:
edb_id(required): Exploit-DB ID (e.g., "39446")
Example:
Get the path for exploit 39446
4. get_exploit_content
Retrieve and display the full content of an exploit.
Parameters:
edb_id(required): Exploit-DB ID (e.g., "39446")
Example:
Show me the content of exploit 39446
5. mirror_exploit
Copy an exploit file to a specified directory.
Parameters:
edb_id(required): Exploit-DB IDdestination(optional): Destination directory (default: current directory)
Example:
Copy exploit 39446 to /tmp
6. update_exploitdb
Update the local Exploit-DB database.
Example:
Update the exploit database
Usage Examples
Once configured, you can ask Claude questions like:
- "Search for Apache Struts 2.0.0 exploits"
- "Find exploits for CVE-2021-44228"
- "Show me Windows kernel privilege escalation exploits"
- "Get the content of exploit 39446"
- "Search for Linux kernel 3.2 exploits excluding PoC and DoS"
- "Find remote code execution exploits for PHP"
Credits
- Exploit-DB: https://www.exploit-db.com/
- searchsploit: Part of the exploitdb package
- MCP Protocol: https://modelcontextprotocol.io/
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。