Discover Awesome MCP Servers

Extend your agent with 26,683 capabilities via MCP servers.

All26,683
Zadara Storage MCP Server

Zadara Storage MCP Server

Enables management of Zadara VPSA Storage Arrays and Object Storage endpoints, including volume operations, snapshot creation, and bucket management. It allows users to interact with storage resources and retrieve performance metrics using natural language or custom API requests.

SilverBullet MCP Server

SilverBullet MCP Server

Enables LLMs to interact with SilverBullet notes and data through a bridge server. Provides secure access to read and manipulate your SilverBullet space via standardized MCP tools and resources.

pfc-mcp

pfc-mcp

MCP server that gives AI agents full access to ITASCA PFC - browse documentation, run simulations, capture plots, all through natural conversation. Built on the Model Context Protocol, pfc-mcp turns any MCP-compatible AI client (Claude Code, Codex CLI, Gemini CLI, OpenCode, toyoura-nagisa, etc.) into a PFC co-pilot that can look up commands, execute scripts, monitor long-running simulations.

Pollinations Multimodal MCP Server

Pollinations Multimodal MCP Server

Enables AI assistants to generate images, text, and audio content through the Pollinations APIs. Provides direct access to multimodal generation capabilities including image creation from text prompts, text-to-speech, and text generation.

Company MCP Server

Company MCP Server

Enables AI to interact with internal company systems through API integration, supporting data search, information updates, report generation, and system connectivity.

cargo-mcp

cargo-mcp

cargo-mcp

MCP Server

MCP Server

A simple Model Context Protocol server that provides standardized tool functionality, currently implementing a basic calculator for adding two numbers together.

arXiv MCP Server

arXiv MCP Server

Enables AI-powered academic paper discovery, search, and analysis from arXiv with advanced features like semantic search, citation network analysis, and multi-format exports (BibTeX, RIS, JSON, CSV). Provides intelligent research assistance through specialized AI prompts for summarization, trend tracking, and literature review automation.

Agent Construct

Agent Construct

An MCP server implementation that standardizes how AI applications access tools and context, providing a central hub that manages tool discovery, execution, and context management with a simplified configuration system.

Email MCP Server

Email MCP Server

An HTTP/SSE wrapper for the IMAP MCP server that enables users to read, search, and send emails across multiple accounts and providers. It supports secure AES-256 encryption and provides remote access through Claude Web using SSE transport.

MCPserver

MCPserver

That phrase is a bit ambiguous. To translate it accurately, I need to know what "MCP server" means in this context. Here are a few possibilities and their translations: **Possibility 1: MCP refers to a specific software or platform (e.g., a Minecraft server, or a server using a specific protocol called MCP).** * In this case, the best translation would be: **Servidor MCP para chat de IA** (This is a direct translation and assumes the audience knows what "MCP" refers to.) **Possibility 2: MCP stands for "Managed Cloud Provider" or similar.** * In this case, a more descriptive translation might be: **Servidor de proveedor de nube gestionado para chat de IA** (Managed cloud provider server for AI chat) **Possibility 3: MCP is a typo and you meant something else.** * If you meant something else, please clarify and I can provide a more accurate translation. **Therefore, without more context, the most likely and generally applicable translation is: Servidor MCP para chat de IA**

Pocketsmith MCP Server

Pocketsmith MCP Server

Enables AI assistants to interact with the Pocketsmith personal finance API to manage accounts, budgets, and transactions through natural language. It supports comprehensive financial tasks including spending analysis, category management, and tracking recurring bills.

Open Brewery DB MCP Server

Open Brewery DB MCP Server

Provides access to the Open Brewery DB API, allowing AI assistants to search for breweries and retrieve detailed information like location, type, and contact details. It enables interactive exploration of a global database containing over 40,000 breweries.

TypeScript Package Introspector (MCP Server)

TypeScript Package Introspector (MCP Server)

SQL MCP Server

SQL MCP Server

Enables natural language and SQL querying across SQLite, MySQL, PostgreSQL, and MongoDB databases with support for bulk operations and schema inspection. It features a safety mechanism requiring explicit user confirmation for destructive actions like data modification and deletion.

XMind Generator MCP

XMind Generator MCP

An MCP server that enables users to generate structured XMind mind maps with hierarchical topics, notes, and labels through natural language. It features automatic file saving to the local Documents folder and can automatically open generated maps in the XMind application.

Storyblok MCP Server

Storyblok MCP Server

The Storyblok MCP server enables your AI assistants to directly access and manage your Storyblok spaces, stories, components, assets, workflows, and more.

MCP Ethical Hacking

MCP Ethical Hacking

Here's a sample ethical hacking security plan for educational purposes. Remember, this is a simplified example and a real-world plan would be much more detailed and specific to the organization. **Title:** Ethical Hacking Security Assessment Plan - [School/Organization Name] **1. Introduction** * **Purpose:** This document outlines the plan for a controlled ethical hacking assessment of [School/Organization Name]'s network and systems. The goal is to identify vulnerabilities and weaknesses that could be exploited by malicious actors, allowing for proactive remediation and improved security posture. This assessment is for educational purposes and will be conducted with the full knowledge and consent of [School/Organization Name]. * **Scope:** This assessment will focus on [Specify areas, e.g., web applications, internal network, wireless network, specific servers]. It will *not* include [Specify exclusions, e.g., student data, critical infrastructure, physical security]. * **Objectives:** * Identify vulnerabilities in [Specify systems/applications]. * Assess the effectiveness of existing security controls. * Provide recommendations for remediation and improvement. * Provide a learning experience for students involved in the assessment. * **Disclaimer:** This assessment is designed to simulate real-world attacks in a controlled environment. Every effort will be made to avoid disruption to normal operations. However, there is always a small risk of unforeseen consequences. All activities will be conducted ethically and legally, adhering to the principles of responsible disclosure. **2. Team and Roles** * **Ethical Hacking Team:** * **Team Lead:** [Name, Credentials/Experience] - Responsible for overall planning, execution, and reporting. * **Team Members:** [Names, Roles/Specializations, e.g., Network Security Specialist, Web Application Security Specialist] - Responsible for specific tasks within the assessment. * **[School/Organization Name] Liaison:** [Name, Title] - Point of contact for communication, approvals, and coordination. * **Legal Counsel (if applicable):** [Name] - Provides legal oversight and ensures compliance. **3. Methodology** * **Phases:** * **Planning & Reconnaissance:** Defining the scope, gathering information about the target systems, and obtaining necessary permissions. * **Scanning:** Identifying open ports, services, and potential vulnerabilities using automated tools (e.g., Nmap, Nessus). * **Vulnerability Assessment:** Analyzing scan results to identify exploitable vulnerabilities. * **Exploitation (Controlled):** Attempting to exploit identified vulnerabilities in a controlled and documented manner. *This phase will only be conducted with explicit permission and under strict supervision.* * **Reporting:** Documenting all findings, including vulnerabilities, exploitation attempts, and recommendations for remediation. * **Tools:** [List of tools to be used, e.g., Nmap, Metasploit, Burp Suite, Wireshark]. *Only open-source or licensed tools will be used.* * **Rules of Engagement:** * All activities must be pre-approved by the [School/Organization Name] Liaison. * No data will be intentionally destroyed or modified. * Access to sensitive data will be minimized and handled with utmost confidentiality. * Any discovered vulnerabilities will be immediately reported to the [School/Organization Name] Liaison. * The assessment will be stopped immediately if it poses a significant risk to the organization's operations. * The ethical hacking team will adhere to all applicable laws and regulations. **4. Communication Plan** * **Regular Updates:** The Ethical Hacking Team will provide regular updates to the [School/Organization Name] Liaison on the progress of the assessment. * **Emergency Contact:** [Name, Phone Number] - Contact person in case of any unexpected issues or emergencies. * **Reporting:** A detailed report will be provided to the [School/Organization Name] Liaison upon completion of the assessment. **5. Reporting** * The final report will include: * Executive Summary: A high-level overview of the assessment and its findings. * Methodology: A description of the methods used during the assessment. * Vulnerability Assessment: A detailed description of each identified vulnerability, including its severity, potential impact, and recommended remediation steps. * Exploitation Results: A summary of any successful exploitation attempts. * Recommendations: Specific recommendations for improving the organization's security posture. * Appendix: Supporting documentation, such as scan reports and screenshots. **6. Legal and Ethical Considerations** * **Informed Consent:** [School/Organization Name] has provided informed consent for this assessment. * **Confidentiality:** All information obtained during the assessment will be treated as confidential. * **Data Protection:** All data will be handled in accordance with applicable data protection laws and regulations. * **Compliance:** The assessment will be conducted in compliance with all applicable laws and regulations. **7. Timeline** * [Start Date] - [End Date]: Detailed schedule of activities, including planning, scanning, vulnerability assessment, exploitation (if applicable), and reporting. **8. Approval** * [Signature of Team Lead] * [Signature of [School/Organization Name] Liaison] * [Date] **Important Considerations for Educational Use:** * **Supervision:** All activities must be closely supervised by experienced instructors. * **Limited Scope:** The scope of the assessment should be carefully limited to avoid any potential harm to real-world systems. * **Simulated Environments:** Whenever possible, use simulated environments (e.g., virtual machines, lab networks) for hands-on exercises. * **Ethical Discussions:** Emphasize the importance of ethical behavior and responsible disclosure. * **Legal Compliance:** Ensure that all activities comply with applicable laws and regulations. This is a basic framework. You'll need to adapt it to your specific educational context and the systems you'll be assessing. Good luck! Now, here's the translation to Spanish: **Plan de Evaluación de Seguridad de Hacking Ético - [Nombre de la Escuela/Organización]** **1. Introducción** * **Propósito:** Este documento describe el plan para una evaluación controlada de hacking ético de la red y los sistemas de [Nombre de la Escuela/Organización]. El objetivo es identificar vulnerabilidades y debilidades que podrían ser explotadas por actores maliciosos, permitiendo la remediación proactiva y la mejora de la postura de seguridad. Esta evaluación tiene fines educativos y se llevará a cabo con el pleno conocimiento y consentimiento de [Nombre de la Escuela/Organización]. * **Alcance:** Esta evaluación se centrará en [Especificar áreas, por ejemplo, aplicaciones web, red interna, red inalámbrica, servidores específicos]. *No* incluirá [Especificar exclusiones, por ejemplo, datos de estudiantes, infraestructura crítica, seguridad física]. * **Objetivos:** * Identificar vulnerabilidades en [Especificar sistemas/aplicaciones]. * Evaluar la eficacia de los controles de seguridad existentes. * Proporcionar recomendaciones para la remediación y la mejora. * Proporcionar una experiencia de aprendizaje para los estudiantes involucrados en la evaluación. * **Descargo de responsabilidad:** Esta evaluación está diseñada para simular ataques del mundo real en un entorno controlado. Se hará todo lo posible para evitar la interrupción de las operaciones normales. Sin embargo, siempre existe un pequeño riesgo de consecuencias imprevistas. Todas las actividades se llevarán a cabo de manera ética y legal, adhiriéndose a los principios de divulgación responsable. **2. Equipo y Roles** * **Equipo de Hacking Ético:** * **Líder del Equipo:** [Nombre, Credenciales/Experiencia] - Responsable de la planificación general, la ejecución y la presentación de informes. * **Miembros del Equipo:** [Nombres, Roles/Especializaciones, por ejemplo, Especialista en Seguridad de Redes, Especialista en Seguridad de Aplicaciones Web] - Responsables de tareas específicas dentro de la evaluación. * **Enlace de [Nombre de la Escuela/Organización]:** [Nombre, Título] - Punto de contacto para la comunicación, las aprobaciones y la coordinación. * **Asesor Legal (si corresponde):** [Nombre] - Proporciona supervisión legal y garantiza el cumplimiento. **3. Metodología** * **Fases:** * **Planificación y Reconocimiento:** Definir el alcance, recopilar información sobre los sistemas objetivo y obtener los permisos necesarios. * **Escaneo:** Identificar puertos abiertos, servicios y posibles vulnerabilidades utilizando herramientas automatizadas (por ejemplo, Nmap, Nessus). * **Evaluación de Vulnerabilidades:** Analizar los resultados del escaneo para identificar vulnerabilidades explotables. * **Explotación (Controlada):** Intentar explotar las vulnerabilidades identificadas de manera controlada y documentada. *Esta fase solo se llevará a cabo con permiso explícito y bajo estricta supervisión.* * **Informes:** Documentar todos los hallazgos, incluidas las vulnerabilidades, los intentos de explotación y las recomendaciones para la remediación. * **Herramientas:** [Lista de herramientas que se utilizarán, por ejemplo, Nmap, Metasploit, Burp Suite, Wireshark]. *Solo se utilizarán herramientas de código abierto o con licencia.* * **Reglas de Compromiso:** * Todas las actividades deben ser aprobadas previamente por el Enlace de [Nombre de la Escuela/Organización]. * No se destruirán ni modificarán datos intencionalmente. * El acceso a datos confidenciales se minimizará y se manejará con la máxima confidencialidad. * Cualquier vulnerabilidad descubierta se informará inmediatamente al Enlace de [Nombre de la Escuela/Organización]. * La evaluación se detendrá inmediatamente si representa un riesgo significativo para las operaciones de la organización. * El equipo de hacking ético se adherirá a todas las leyes y regulaciones aplicables. **4. Plan de Comunicación** * **Actualizaciones Periódicas:** El Equipo de Hacking Ético proporcionará actualizaciones periódicas al Enlace de [Nombre de la Escuela/Organización] sobre el progreso de la evaluación. * **Contacto de Emergencia:** [Nombre, Número de Teléfono] - Persona de contacto en caso de problemas inesperados o emergencias. * **Informes:** Se proporcionará un informe detallado al Enlace de [Nombre de la Escuela/Organización] al finalizar la evaluación. **5. Informes** * El informe final incluirá: * Resumen Ejecutivo: Una descripción general de alto nivel de la evaluación y sus hallazgos. * Metodología: Una descripción de los métodos utilizados durante la evaluación. * Evaluación de Vulnerabilidades: Una descripción detallada de cada vulnerabilidad identificada, incluida su gravedad, impacto potencial y pasos de remediación recomendados. * Resultados de la Explotación: Un resumen de cualquier intento de explotación exitoso. * Recomendaciones: Recomendaciones específicas para mejorar la postura de seguridad de la organización. * Apéndice: Documentación de respaldo, como informes de escaneo y capturas de pantalla. **6. Consideraciones Legales y Éticas** * **Consentimiento Informado:** [Nombre de la Escuela/Organización] ha proporcionado consentimiento informado para esta evaluación. * **Confidencialidad:** Toda la información obtenida durante la evaluación se tratará como confidencial. * **Protección de Datos:** Todos los datos se manejarán de acuerdo con las leyes y regulaciones de protección de datos aplicables. * **Cumplimiento:** La evaluación se llevará a cabo en cumplimiento de todas las leyes y regulaciones aplicables. **7. Cronograma** * [Fecha de Inicio] - [Fecha de Finalización]: Cronograma detallado de actividades, incluida la planificación, el escaneo, la evaluación de vulnerabilidades, la explotación (si corresponde) y la presentación de informes. **8. Aprobación** * [Firma del Líder del Equipo] * [Firma del Enlace de [Nombre de la Escuela/Organización]] * [Fecha] **Consideraciones Importantes para el Uso Educativo:** * **Supervisión:** Todas las actividades deben ser supervisadas de cerca por instructores experimentados. * **Alcance Limitado:** El alcance de la evaluación debe limitarse cuidadosamente para evitar cualquier daño potencial a los sistemas del mundo real. * **Entornos Simulados:** Siempre que sea posible, utilice entornos simulados (por ejemplo, máquinas virtuales, redes de laboratorio) para ejercicios prácticos. * **Discusiones Éticas:** Enfatice la importancia del comportamiento ético y la divulgación responsable. * **Cumplimiento Legal:** Asegúrese de que todas las actividades cumplan con las leyes y regulaciones aplicables. Este es un marco básico. Deberá adaptarlo a su contexto educativo específico y a los sistemas que evaluará. ¡Buena suerte!

Remote YouTube MCP Server

Remote YouTube MCP Server

A remote Model Context Protocol server that extracts YouTube video transcripts and provides content creation templates using OAuth 2.0 authentication. It enables secure interaction with YouTube content for AI clients like ChatGPT and Claude.

MCP Google Sheets Server

MCP Google Sheets Server

Enables reading, writing, and managing Google Sheets documents with support for batch operations, formatting, charts, and conditional formatting through the Model Context Protocol.

EdgeOne Pages MCP

EdgeOne Pages MCP

Enables the deployment of HTML content, folders, and full-stack projects to EdgeOne Pages to generate publicly accessible URLs. It integrates with edge functions and KV storage to provide fast content delivery and supports custom domain configuration.

LinkedIn Profile Data Mining

LinkedIn Profile Data Mining

Enables comprehensive LinkedIn profile search, data extraction, and contact enrichment using Google Search, Apollo.io, and AI-powered analysis. Includes automated data mining workflows with database storage and CSV export capabilities.

Remote MCP Server on Cloudflare

Remote MCP Server on Cloudflare

A serverless Model Context Protocol (MCP) implementation for Cloudflare Workers that enables AI models to access custom tools without authentication.

FastMCP

FastMCP

A collection of MCP servers providing utilities including user greeting, message decoding, text file reading with PDF summary generation, and NASA-quality code auditing using a trained AI model to predict software defects and measure code complexity.

Custom MCP Server

Custom MCP Server

A Next.js-based MCP server that provides basic utility tools including echo, current time retrieval, and safe mathematical calculations through HTTP and SSE transports.

MCP Dust Server

MCP Dust Server

Un servidor de Protocolo de Contexto de Modelo que permite la interacción con agentes de IA de Dust, permitiendo la integración con entornos de desarrollo como Windsurf IDE y Claude Desktop.

Official Substack MCP Server

Official Substack MCP Server

Official Substack MCP Server

Google Analytics MCP Server

Google Analytics MCP Server

A FastMCP-powered server that connects Google Analytics 4 data to Claude Desktop with automatic OAuth 2.0 authentication, enabling users to access GA4 metrics, properties, and reports through natural language queries.

Clockify MCP Server

Clockify MCP Server

Enables AI assistants to interact with Clockify time tracking API to manage time entries, projects, tasks, and workspaces through natural language commands.

MCP Azure Project

MCP Azure Project

This MCP server integrates with Azure AI Foundry's Claude deployment to provide document management functionality. It enables tools for reading, writing, and listing files, allowing Claude to interact with local documents through an Azure-compatible client.