Discover Awesome MCP Servers

Extend your agent with 23,601 capabilities via MCP servers.

All23,601
SAS Data Sets MCP Server by CData

SAS Data Sets MCP Server by CData

SAS Data Sets MCP Server by CData

Netmind Web3 MCP Server

Netmind Web3 MCP Server

Provides a comprehensive suite of Web3 tools for querying token addresses, news summaries, and real-time market data via CoinGecko. It also facilitates DeFi operations including token price tracking, pool information, and swap quotes through Sugar DeFi integration.

SEC Filing MCP Server

SEC Filing MCP Server

Enables querying and analysis of SEC filing documents through natural language. Uses Pinecone vector search with document summarization to help users retrieve and understand financial filings for various companies.

ODIADEV MCP Server

ODIADEV MCP Server

Nigeria's AI infrastructure server that provides business automation agents including WhatsApp automation, university support, travel management, and legal document processing. Integrates payment processing, text-to-speech capabilities, and webhook handling for Nigerian businesses.

Google Ads MCP Server

Google Ads MCP Server

Enables comprehensive Google Ads campaign management and analysis through natural language, including performance metrics, keyword optimization, budget management, and custom GAQL queries.

SFCC Development MCP Server

SFCC Development MCP Server

Provides comprehensive access to Salesforce B2C Commerce Cloud development tools including SFCC API documentation, best practices guides, log analysis, and system object definitions. Enables AI assistants to help with SFCC development tasks through both documentation-only mode and full credential-based mode.

markdownlint-mcp

markdownlint-mcp

Provides AI assistants with the ability to lint, validate, and auto-fix Markdown files to ensure compliance with established Markdown standards and best practices.

mcp-umami

mcp-umami

Connect your Umami Analytics to any MCP client to derive insights from natural language.

OpenStreetMap Tagging Schema MCP Server

OpenStreetMap Tagging Schema MCP Server

Provides AI agents access to OpenStreetMap's comprehensive tagging knowledge base, enabling tag queries, preset discovery, and validation of OSM tags for mapping applications.

Local Scanner MCP Server

Local Scanner MCP Server

Here are a few options for an MCP (Malware Configuration Parser) server that can scan local code and localhost URLs, along with considerations for each: **1. Using Existing Malware Analysis Sandboxes (with API access):** * **Concept:** Leverage established online sandboxes that offer API access. You'd submit your local code or URLs to the sandbox via its API, and it would perform the analysis and return the results. This is often the most practical approach because it avoids the complexity of setting up and maintaining your own full-fledged sandbox. * **Examples:** * **VirusTotal:** A very popular and free (with limitations) service. It aggregates results from many different antivirus engines. Excellent for a quick check. The API has rate limits, so it's not ideal for high-volume scanning without a paid subscription. * **Hybrid Analysis (Falcon Sandbox):** A more advanced sandbox that provides detailed behavioral analysis reports. It has a free tier with limitations and paid options for more features and higher usage. * **ANY.RUN:** An interactive online sandbox that allows you to observe malware execution in real-time. It has a free tier and paid options. * **Joe Sandbox Cloud:** A commercial sandbox with a wide range of analysis capabilities. * **Implementation:** 1. **Choose a Sandbox:** Select a sandbox that meets your needs in terms of features, pricing, and API access. 2. **Obtain API Key:** Register for an account and obtain an API key. 3. **Write a Script/Application:** Develop a script (e.g., in Python) or application that: * Reads the local code or URL. * Uses the sandbox's API to submit the code/URL for analysis. * Parses the API response to extract the relevant information (e.g., detected malware, behavioral indicators). * Presents the results to the user. * **Pros:** * Relatively easy to set up. * Leverages the expertise and resources of established security vendors. * Access to a wide range of analysis tools and techniques. * Often provides detailed reports. * **Cons:** * Requires an internet connection. * May have rate limits or usage restrictions (especially with free tiers). * You are trusting a third party with your code/URLs (consider privacy implications). * API changes can break your integration. **2. Using Open-Source Malware Analysis Tools (Local Installation):** * **Concept:** Install open-source malware analysis tools on your own server. This gives you more control but requires significantly more effort to set up and maintain. * **Examples:** * **Cuckoo Sandbox:** A popular open-source automated malware analysis system. It runs malware in a virtualized environment and records its behavior. Requires significant setup and configuration. * **YARA:** A pattern-matching tool that can be used to identify malware based on rules. You'll need to create or find YARA rules relevant to the types of malware you're looking for. * **ClamAV:** An open-source antivirus engine. Can be used for basic malware detection. * **Radare2:** A reverse engineering framework that can be used to analyze malware. Very powerful but has a steep learning curve. * **Implementation:** 1. **Choose Tools:** Select the tools that best fit your needs. Cuckoo Sandbox is a good starting point for comprehensive analysis. 2. **Install and Configure:** Follow the installation instructions for each tool. This can be complex, especially for Cuckoo Sandbox. You'll need to set up virtual machines, networking, and other dependencies. 3. **Develop a Script/Application:** Write a script or application that: * Reads the local code or URL. * Submits the code/URL to the analysis tools. * Parses the output of the tools to extract the relevant information. * Presents the results to the user. * **Pros:** * More control over the analysis environment. * No reliance on third-party services. * Can be used offline. * Potentially more privacy. * **Cons:** * Significantly more complex to set up and maintain. * Requires a good understanding of malware analysis techniques. * Requires more resources (hardware, time, expertise). * You are responsible for keeping the tools up-to-date and secure. * May require creating your own malware signatures or rules. **3. Simplified Local Scanning (Basic):** * **Concept:** Use simpler tools for basic scanning, such as file hashing and string searching. This is not a full-fledged MCP server but can be useful for identifying known malicious files or patterns. * **Examples:** * **Hashing:** Calculate the MD5, SHA-1, or SHA-256 hash of the file and compare it to known malware hashes (e.g., from VirusTotal's database). * **String Searching:** Search for suspicious strings in the code, such as URLs, IP addresses, or function names associated with malware. * **Regular Expressions:** Use regular expressions to identify patterns that might indicate malicious code. * **Implementation:** 1. **Write a Script/Application:** Develop a script or application that: * Reads the local code or URL. * Calculates the hash of the file. * Searches for suspicious strings or patterns. * Presents the results to the user. * **Pros:** * Simple to implement. * Fast. * Can be used offline. * **Cons:** * Limited detection capabilities. * Easily bypassed by malware authors. * High false positive rate. **Important Considerations:** * **Security:** If you are running malware analysis tools on your own server, it is crucial to isolate the environment to prevent malware from escaping and infecting your system. Use virtualization, sandboxing, and network segmentation. * **Privacy:** Be careful about submitting sensitive code or URLs to third-party services. Consider the privacy implications and choose services that have a good reputation for data security. * **False Positives:** Malware analysis tools can sometimes produce false positives. It is important to carefully review the results and investigate any suspicious findings. * **Updates:** Keep your malware analysis tools and signature databases up-to-date to ensure that they can detect the latest threats. * **Legal Issues:** Be aware of any legal restrictions on analyzing malware. In some jurisdictions, it may be illegal to possess or analyze malware without authorization. **Example (Python using VirusTotal API - Basic):** ```python import requests import hashlib import os def scan_file_with_virustotal(file_path, api_key): """Scans a file with VirusTotal using its API.""" if not os.path.exists(file_path): print(f"Error: File not found: {file_path}") return try: with open(file_path, "rb") as f: file_content = f.read() file_hash = hashlib.sha256(file_content).hexdigest() url = "https://www.virustotal.com/api/v3/files" headers = {"x-apikey": api_key} files = {"file": (os.path.basename(file_path), file_content)} response = requests.post(url, headers=headers, files=files) if response.status_code == 200: analysis_id = response.json()['data']['id'] print(f"File uploaded. Analysis ID: {analysis_id}") # Poll for results (you might need to wait a few minutes) analysis_url = f"https://www.virustotal.com/api/v3/analyses/{analysis_id}" analysis_response = requests.get(analysis_url, headers=headers) if analysis_response.status_code == 200: analysis_data = analysis_response.json()['data']['attributes']['stats'] print("Analysis Results:") print(f" Detected: {analysis_data['malicious']}") print(f" Undetected: {analysis_data['undetected']}") print(f" Harmless: {analysis_data['harmless']}") print(f" Suspicious: {analysis_data['suspicious']}") else: print(f"Error getting analysis results: {analysis_response.status_code} - {analysis_response.text}") else: print(f"Error uploading file: {response.status_code} - {response.text}") except Exception as e: print(f"An error occurred: {e}") if __name__ == "__main__": file_to_scan = "path/to/your/file.exe" # Replace with the actual path to your file virustotal_api_key = "YOUR_VIRUSTOTAL_API_KEY" # Replace with your VirusTotal API key scan_file_with_virustotal(file_to_scan, virustotal_api_key) ``` **Explanation of the Python example:** 1. **Imports:** Imports necessary libraries (requests for making HTTP requests, hashlib for calculating file hashes, and os for file operations). 2. **`scan_file_with_virustotal` function:** * Takes the file path and VirusTotal API key as input. * Reads the file content in binary mode (`"rb"`). * Calculates the SHA-256 hash of the file. * Constructs the API request to upload the file to VirusTotal. * Sends the request using `requests.post`. * Parses the JSON response to get the analysis ID. * Polls the VirusTotal API to get the analysis results. * Prints the detection statistics (malicious, undetected, harmless, suspicious). * Handles potential errors. 3. **`if __name__ == "__main__":` block:** * Sets the `file_to_scan` and `virustotal_api_key` variables. **You must replace these with your actual file path and API key.** * Calls the `scan_file_with_virustotal` function to scan the file. **To use this example:** 1. **Install `requests`:** `pip install requests` 2. **Get a VirusTotal API Key:** Sign up for a free account on VirusTotal ([https://www.virustotal.com/](https://www.virustotal.com/)) and obtain an API key. 3. **Replace Placeholders:** Replace `"path/to/your/file.exe"` and `"YOUR_VIRUSTOTAL_API_KEY"` with the actual values. 4. **Run the Script:** Execute the Python script. This is a basic example. You can extend it to handle URLs, process the analysis results in more detail, and integrate it into a larger application. Remember to handle errors and rate limits appropriately. **For scanning localhost URLs:** The approach is similar to scanning local files, but instead of reading a file, you would make an HTTP request to the localhost URL and analyze the response. You could use the `requests` library in Python to make the HTTP request and then analyze the HTML or JavaScript code in the response for suspicious patterns. You could also use a headless browser like Puppeteer or Selenium to render the page and analyze the rendered content. Be very careful when visiting localhost URLs, as they could potentially execute malicious code on your system. Choose the option that best suits your needs and technical expertise. For most use cases, using an existing malware analysis sandbox with API access is the most practical and efficient approach. Remember to prioritize security and privacy when handling potentially malicious code.

nUR MCP Server

nUR MCP Server

An intelligent middleware system that enables natural language interactive control of Universal Robots collaborative robots, allowing users to connect to and control industrial robots through voice/text commands with MCP-compatible LLMs.

Browser MCP Server

Browser MCP Server

Enables AI assistants to automate web browsers through Playwright, providing capabilities for navigation, content extraction, form filling, screenshot capture, and JavaScript execution. Supports multiple browser engines with comprehensive error handling and security features.

Zendesk MCP Server

Zendesk MCP Server

A server implementation that provides Claude AI with the ability to interact with Zendesk ticketing systems through various functions including retrieving, searching, creating, and updating tickets.

Avalara AvaTax MCP Server by CData

Avalara AvaTax MCP Server by CData

This read-only MCP Server allows you to connect to Avalara AvaTax data from Claude Desktop through CData JDBC Drivers. Free (beta) read/write servers available at https://www.cdata.com/solutions/mcp

BOIM WordPress Stack MCP

BOIM WordPress Stack MCP

An MCP server providing WordPress development tools, code generation, and framework guides for Gutenberg blocks, GeneratePress themes, and WPCodebox snippets. It enables developers to generate standards-compliant code while following security and performance best practices.

Academiadepolitie.com MCP Server

Academiadepolitie.com MCP Server

Provides AI tutoring capabilities for Romanian police academy entrance exam preparation, enabling students to access educational content, track learning progress, and collaborate with peers. Connects to the Academiadepolitie.com platform serving over 50,000 students with comprehensive study materials for law enforcement subjects.

Vectorize MCP Server

Vectorize MCP Server

Provides semantic search capabilities by connecting Claude Desktop to a Cloudflare Workers backend powered by Vectorize. It enables natural language querying of knowledge bases using vector similarity and edge-based embedding generation.

File Manager MCP Server

File Manager MCP Server

Provides secure file system operations for AI assistants including directory listing, file reading/writing, deletion, searching, and copying. Features safety controls like path validation, permission checks, and file size limits.

PathScan MCP Server

PathScan MCP Server

Enables website security scanning and vulnerability assessment by integrating dirsearch path scanning with firecrawl web scraping. Provides structured vulnerability reports categorized by risk level and detailed content analysis of high-risk URLs.

MCP Enabled PDF Reader

MCP Enabled PDF Reader

Server Model Context Protocol (MCP) untuk membaca satu dokumen PDF.

MCP Generate UUID Server

MCP Generate UUID Server

Claude Team MCP

Claude Team MCP

Enables collaboration between multiple AI models (GPT, Claude, Gemini) to work together on complex tasks, with intelligent task distribution and role-based expert assignment for code development, review, and optimization.

MCP Probe Kit

MCP Probe Kit

A comprehensive development toolkit with 23 tools covering code quality analysis, development efficiency, and project management. Enables AI-assisted code review, test generation, performance analysis, SQL generation, UI component creation, and automated project documentation.

Vue Prime MCP Server

Vue Prime MCP Server

Provides access to PrimeVue documentation through MCP, enabling retrieval of component documentation, full docs, and structured documentation pages for AI-assisted Vue.js development.

Square Model Context Protocol Server

Square Model Context Protocol Server

Enables AI assistants to interact with Square's Connect API through the Model Context Protocol standard, allowing for operations like managing customers, processing payments, and handling inventory.

Memory MCP 服务器

Memory MCP 服务器

Here are a few possible translations, depending on the specific context: * **Most literal:** Sekali klik untuk menjalankan memory mcp, menyediakan layanan SSE. * **More natural, emphasizing ease of use:** Jalankan memory mcp dengan sekali klik, dan sediakan layanan SSE. * **If "memory mcp" is a specific application/service:** Luncurkan memory mcp dengan sekali klik dan sediakan layanan SSE. **Explanation of choices:** * **Sekali klik:** Means "one click" or "single click." * **Menjalankan:** Means "to run" or "to execute." * **Luncurkan:** Means "to launch," often used for applications or services. * **Memory mcp:** I've kept this as is, assuming it's a specific term. If you can provide more context, I can refine the translation. * **对外提供 (Duìwài tígōng):** This translates to "provide externally" or "provide to the outside." I've translated it as "menyediakan" which means "to provide." * **SSE 服务 (SSE fúwù):** This is "SSE service." I've kept it as "layanan SSE" which means "SSE service." Therefore, the best translation depends on the specific meaning you want to convey. If you can provide more context about what "memory mcp" is, I can give you a more accurate translation.

UnrealBlueprintMCP

UnrealBlueprintMCP

Enables AI agents to create and modify Unreal Engine blueprints using natural language commands. Supports blueprint creation, property modification, and real-time communication with Unreal Editor through WebSocket integration.

Notepad++ MCP Server

Notepad++ MCP Server

Enables comprehensive automation and control of Notepad++ on Windows, including file operations, text editing, tab management, and session management through 15 integrated tools. Supports advanced workspace management with the ability to save and restore complete editing sessions.

ScreenshotOne MCP Server

ScreenshotOne MCP Server

Connects AI assistants to ScreenshotOne.com API for capturing website screenshots with customizable options including viewport size, full-page captures, and multiple output formats.

Calva Backseat Driver

Calva Backseat Driver

Enables AI assistants to interact with Clojure REPLs for evaluating code, performing structural edits with bracket balancing, and looking up symbol documentation. Transforms AI coding assistants into interactive programming partners with access to runtime evaluation and real data structures.