Built by Metorial, the integration platform for agentic AI.

Learn More

Connect to
Google Drive

Explore thousands of MCP servers. And connect to them in a single function call.

Stripe

SemgrepSemgrep

Semgrep MCP Server

Scan code for security vulnerabilities and create custom rules with Semgrep. It provides an interface for advanced code analysis and security enhancements.

tumftumf

Shell Server

Execute shell commands securely by utilizing a whitelist, with the ability to provide standard input and receive comprehensive output from commands.

BurtBurt

VirusTotal Server

Integrate with the VirusTotal API to conduct comprehensive security analysis and fetch automatic relationship data related to files, URLs, and IP addresses. This functionality allows for seamless integration with MCP-compatible applications for malware detection and cybersecurity assessments.

BurtBurt

Shodan Server

Query the Shodan API and Shodan CVEDB for network intelligence, including IP reconnaissance, DNS operations, vulnerability tracking, and device discovery. Outputs are structured and formatted for easy analysis and integration.

Christoph EnglischChristoph Englisch

Keycloak

Manage users and realms in Keycloak, including creating and deleting users, as well as listing available realms and users within specific realms.

Spathodea NetworkSpathodea Network

OpenCTI Server

Integrate with OpenCTI to access cyber threat intelligence data, enabling queries for threat intelligence reports, malware information, and indicators of compromise.

CoBrowserCoBrowser

Remotely Attestable MCP Server

Facilitates secure and verifiable interactions between MCP clients and servers using remote attestation, ensuring integrity of the running code. Provides compliance and governance capabilities through independently verifiable code execution.

rad-securityrad-security

RAD Security MCP Server

Provides AI-powered security insights focused on Kubernetes and cloud environments, enabling monitoring, analysis, and securing of infrastructure with detailed visibility and actionable findings.

kukapaykukapay

Token Revoke

Check and revoke ERC-20 token allowances, manage token approvals across multiple chains, and monitor token permissions for enhanced wallet security.

FirstOrder.AIFirstOrder.AI

Authenticator App Server

Enables AI agents to securely access 2FA codes and passwords for automated login processes. Facilitates credential management across platforms by bridging AI assistants with secure authentication.

8bit-Wraith8bit-Wraith

Enhanced SSH

Enhanced SSH is a secure remote server that allows users to execute commands on other computers while maintaining persistent sessions and managing multiple windows for efficiency.

Vishal ChandVishal Chand

Volatility MCP Server

Analyze memory dumps using natural language queries to facilitate forensic investigations, reducing the need for technical expertise while accelerating the analysis process and improving cybersecurity responses.

KameronKameron

Palo Alto Policy Management Server

Manage Palo Alto Networks firewall policies and configurations through a standardized interface. Integrate with the Palo Alto Networks API for querying and modifying security, NAT, and QoS rules.

KirandawadiKirandawadi

Volatility3 MCP Server

Analyze memory dumps to detect malware and perform memory forensics using a natural language interface, making the process accessible to users without specialized knowledge.

Lucas ZanoniLucas Zanoni

Token Info Server

Validates OAuth tokens and retrieves detailed information including expiration status, validity time, client details, associated scopes, and user ID. Enables seamless integration with MCP-compatible clients to streamline token management workflows.

Pratham PanchariyaPratham Panchariya

OAuth-Enabled MCP Server

Enables secure user authentication and authorization for MCP servers through OAuth, facilitating calls to protected APIs on behalf of authenticated users. Simplifies integration with Auth0 and Cloudflare Workers for effective identity management.

Navendu PottekkatNavendu Pottekkat

Sandbox

Runs code in secure, isolated Docker containers, preventing unintended consequences from untested code execution. Provides a configurable execution environment for LLMs to safely test code locally.

PhialityPhiality

NMAP Server

Perform network analysis and security assessments through NMAP by interacting with an AI assistant for network scanning operations.

Rob BosRob Bos

GitHub Advanced Security Server

Integrates GitHub Advanced Security features into development environments, enabling management of dependabot alerts, secret scanning alerts, and code scanning alerts directly from tools. Enhances repository security by providing streamlined access to critical alerts and insights.

SnykSnyk

Snyk Language Server

Provides real-time security diagnostics and code analysis by integrating vulnerability scanning for open source dependencies, infrastructure as code, and code quality/security issues. It enhances development workflows with authentication, progress reporting, and trusted folder management for effective vulnerability management.

ricautsricauts

CyberMCP

CyberMCP tests backend APIs for security vulnerabilities using specialized tools. It identifies common security issues such as injection flaws, data leakage, and authentication vulnerabilities, while providing resources for comprehensive security assessments.

Anton PidkuikoAnton Pidkuiko

Tiny Cryptography Server

Generates cryptographic keys, derives shared secrets, and encrypts or decrypts messages. Facilitates secure communication for applications requiring cryptographic capabilities.

Dynatrace Open SourceDynatrace Open Source

Dynatrace Observability Server

Connect to the Dynatrace observability platform to retrieve real-time observability data, including production problems, security vulnerabilities, logs, and events. Utilize natural language queries to automate notifications and integrate monitoring within development workflows.

seoksikseoksik

Messenger Phishing Detection

Predicts and prevents messenger phishing attacks through AI-based analysis of chat content, providing real-time alerts to users when phishing is detected, aimed at reducing financial loss and personal data breaches.

GravityPhoneGravityPhone

Grey Swan LLM Safety Challenge

Document and analyze safety challenges related to LLMs, track vulnerabilities, and facilitate structured analysis of interactions with AI systems.