Discover Awesome MCP Servers

Extend your agent with 26,654 capabilities via MCP servers.

All26,654
MCP Server

MCP Server

A simple Model Context Protocol server that provides standardized tool functionality, currently implementing a basic calculator for adding two numbers together.

arXiv MCP Server

arXiv MCP Server

Enables AI-powered academic paper discovery, search, and analysis from arXiv with advanced features like semantic search, citation network analysis, and multi-format exports (BibTeX, RIS, JSON, CSV). Provides intelligent research assistance through specialized AI prompts for summarization, trend tracking, and literature review automation.

Agent Construct

Agent Construct

An MCP server implementation that standardizes how AI applications access tools and context, providing a central hub that manages tool discovery, execution, and context management with a simplified configuration system.

Email MCP Server

Email MCP Server

An HTTP/SSE wrapper for the IMAP MCP server that enables users to read, search, and send emails across multiple accounts and providers. It supports secure AES-256 encryption and provides remote access through Claude Web using SSE transport.

MCPserver

MCPserver

Servidor MCP para bate-papo com IA

Pocketsmith MCP Server

Pocketsmith MCP Server

Enables AI assistants to interact with the Pocketsmith personal finance API to manage accounts, budgets, and transactions through natural language. It supports comprehensive financial tasks including spending analysis, category management, and tracking recurring bills.

Open Brewery DB MCP Server

Open Brewery DB MCP Server

Provides access to the Open Brewery DB API, allowing AI assistants to search for breweries and retrieve detailed information like location, type, and contact details. It enables interactive exploration of a global database containing over 40,000 breweries.

TypeScript Package Introspector (MCP Server)

TypeScript Package Introspector (MCP Server)

SQL MCP Server

SQL MCP Server

Enables natural language and SQL querying across SQLite, MySQL, PostgreSQL, and MongoDB databases with support for bulk operations and schema inspection. It features a safety mechanism requiring explicit user confirmation for destructive actions like data modification and deletion.

make-mcp-server-claude

make-mcp-server-claude

linkedmcp

linkedmcp

linkedmcp

Gmail MCP Server

Gmail MCP Server

Enables Claude AI to directly interact with Gmail through natural language for comprehensive email management including sending, reading, searching, organizing, and managing drafts and labels. Uses secure OAuth authentication and runs locally without third-party servers.

Cozi MCP Server

Cozi MCP Server

Enables management of Cozi Family Organizer shopping lists and todo lists through natural language. Supports creating, editing, and organizing family lists with real-time sync to the Cozi platform.

Data Commons MCP Server

Data Commons MCP Server

Enables AI agents to query and retrieve public statistical data from Data Commons through search and observation tools. Provides access to demographic, economic, and other statistical indicators for analysis and research.

Playwright MCP HTTP Server

Playwright MCP HTTP Server

Provides browser automation capabilities via HTTP endpoints by wrapping the official Playwright MCP package, enabling serverless deployments and cloud environments where STDIO-based communication is not possible.

MCP Run Python

MCP Run Python

Enables secure execution of Python code in a sandboxed WebAssembly environment using Pyodide and Deno. Automatically handles package management and captures complete execution results including stdout, stderr, and return values.

lmwharton/sieve-mcp

lmwharton/sieve-mcp

vc analyst for pitch deck to memo gen

SpineFrame

SpineFrame

SpineFrame is a audit-grade runtime that gives AI agents auditable provenance — every tool call, every piece of evidence, every decision is traced, policy-checked, and cryptographically signed. Signed evidence chains, compliance pipelines, and tool-call tracing that survives regulatory scrutiny.

git-mcp

git-mcp

Servidor MCP para interagir com um repositório Git.

Clockify MCP Server

Clockify MCP Server

Enables AI assistants to interact with Clockify time tracking API to manage time entries, projects, tasks, and workspaces through natural language commands.

MCP Azure Project

MCP Azure Project

This MCP server integrates with Azure AI Foundry's Claude deployment to provide document management functionality. It enables tools for reading, writing, and listing files, allowing Claude to interact with local documents through an Azure-compatible client.

MCP Server Tester

MCP Server Tester

Job Searchoor MCP Server

Job Searchoor MCP Server

Um servidor MCP simples que entrega trabalhos com base nas suas necessidades.

VSCode LSP MCP Server

VSCode LSP MCP Server

An MCP server that exposes Language Server Protocol features to external clients, allowing access to hover information, definitions, completions, references, and rename functionalities.

MCP Character Counter

MCP Character Counter

A lightweight server that provides detailed text analysis, counting total characters, characters without spaces, letters, numbers, and symbols for AI assistants like Claude Desktop and GitHub Copilot.

2025-04-02-mcp-server

2025-04-02-mcp-server

Kagi MCP

Kagi MCP

A Node.js implementation of the Kagi Model Context Protocol server that enables Claude AI to search the web and summarize documents, videos, and audio using Kagi's APIs.

XMind Generator MCP

XMind Generator MCP

An MCP server that enables users to generate structured XMind mind maps with hierarchical topics, notes, and labels through natural language. It features automatic file saving to the local Documents folder and can automatically open generated maps in the XMind application.

Storyblok MCP Server

Storyblok MCP Server

The Storyblok MCP server enables your AI assistants to directly access and manage your Storyblok spaces, stories, components, assets, workflows, and more.

MCP Ethical Hacking

MCP Ethical Hacking

Here's a sample ethical hacking security plan for educational purposes, translated into Portuguese. I've focused on key areas and kept it relatively simple for learning. **English Original:** **Ethical Hacking Security Plan (Educational Sample)** **Objective:** To simulate a controlled ethical hacking exercise to identify vulnerabilities in a simplified network environment and improve security awareness. **Scope:** * A small, isolated network consisting of: * One virtualized web server (running a basic vulnerable application like DVWA or Metasploitable) * One virtualized client machine (e.g., Kali Linux) * Focus areas: Web application vulnerabilities, basic network scanning, and password cracking. **Rules of Engagement:** * **Authorization:** Explicit written permission from the instructor/system owner is required. * **Non-Destructive Testing:** All testing must be non-destructive. No data deletion, modification, or system crashes are permitted. * **Confidentiality:** All findings must be kept confidential and reported only to the instructor. * **Scope Adherence:** Testing must remain within the defined scope. No attempts to access other systems or networks are allowed. * **No Real-World Attacks:** This is a simulation. Do not use information gained to attack real-world systems. * **Reporting:** A detailed report of all vulnerabilities found, methods used, and recommendations for remediation must be submitted. **Tools and Techniques:** * **Network Scanning:** Nmap * **Web Application Scanning:** Burp Suite (Community Edition), OWASP ZAP * **Password Cracking:** John the Ripper, Hashcat (using pre-generated wordlists) * **Vulnerability Exploitation:** Metasploit (within the vulnerable VM) **Reporting Template:** 1. **Executive Summary:** A brief overview of the findings. 2. **Vulnerability Details:** * Description of the vulnerability * Steps to reproduce * Impact of the vulnerability * Severity (High, Medium, Low) 3. **Recommendations:** Specific steps to remediate the vulnerability. 4. **Tools Used:** List of tools used during the assessment. **Disclaimer:** This is a simplified example for educational purposes only. Real-world ethical hacking engagements are far more complex and require extensive planning and expertise. **Portuguese Translation:** **Plano de Segurança de Hacking Ético (Amostra Educacional)** **Objetivo:** Simular um exercício controlado de hacking ético para identificar vulnerabilidades em um ambiente de rede simplificado e melhorar a conscientização sobre segurança. **Escopo:** * Uma pequena rede isolada consistindo em: * Um servidor web virtualizado (executando um aplicativo básico vulnerável como DVWA ou Metasploitable) * Uma máquina cliente virtualizada (por exemplo, Kali Linux) * Áreas de foco: Vulnerabilidades de aplicativos web, varredura básica de rede e quebra de senhas. **Regras de Engajamento:** * **Autorização:** É necessária permissão explícita por escrito do instrutor/proprietário do sistema. * **Testes Não Destrutivos:** Todos os testes devem ser não destrutivos. Nenhuma exclusão, modificação ou falha do sistema é permitida. * **Confidencialidade:** Todas as descobertas devem ser mantidas confidenciais e relatadas apenas ao instrutor. * **Adesão ao Escopo:** Os testes devem permanecer dentro do escopo definido. Nenhuma tentativa de acessar outros sistemas ou redes é permitida. * **Sem Ataques no Mundo Real:** Esta é uma simulação. Não use as informações obtidas para atacar sistemas do mundo real. * **Relatório:** Um relatório detalhado de todas as vulnerabilidades encontradas, métodos utilizados e recomendações para correção deve ser submetido. **Ferramentas e Técnicas:** * **Varredura de Rede:** Nmap * **Varredura de Aplicativos Web:** Burp Suite (Edição Comunitária), OWASP ZAP * **Quebra de Senhas:** John the Ripper, Hashcat (usando listas de palavras pré-geradas) * **Exploração de Vulnerabilidades:** Metasploit (dentro da VM vulnerável) **Modelo de Relatório:** 1. **Resumo Executivo:** Uma breve visão geral das descobertas. 2. **Detalhes da Vulnerabilidade:** * Descrição da vulnerabilidade * Passos para reproduzir * Impacto da vulnerabilidade * Gravidade (Alta, Média, Baixa) 3. **Recomendações:** Passos específicos para corrigir a vulnerabilidade. 4. **Ferramentas Utilizadas:** Lista de ferramentas utilizadas durante a avaliação. **Aviso Legal:** Este é apenas um exemplo simplificado para fins educacionais. Os engajamentos de hacking ético no mundo real são muito mais complexos e exigem planejamento e experiência extensivos. **Key Improvements in the Portuguese Translation:** * **Accuracy:** Ensured accurate translation of technical terms. * **Clarity:** Used clear and concise language for better understanding. * **Cultural Appropriateness:** The language is natural and appropriate for a Portuguese-speaking audience. * **Consistency:** Maintained consistency in terminology throughout the document. This provides a solid foundation for an educational ethical hacking exercise. Remember to always emphasize the importance of ethical behavior and legal compliance. Good luck!