Exploit-DB MCP Server
Integrates the Exploit-DB database with AI assistants to enable searching for exploits, shellcodes, and proof-of-concept code during penetration testing workflows. It allows users to perform keyword searches and direct CVE-to-exploit mappings to retrieve technical security data.
README
Exploit-DB MCP Server for Pentesting
A Model Context Protocol (MCP) server that integrates Exploit-DB with AI assistants like Open-WebUI for penetration testing workflows.
Features
š Search Exploits - Search by keyword, CVE, platform, or type š Get Exploit Code - Retrieve full exploit/PoC code by EDB-ID š Shellcode Search - Find shellcodes by platform and purpose š Database Stats - Get insights into the exploit database šÆ CVE Lookup - Direct CVE-to-exploit mapping
Quick Start
1. Setup
Run the setup script to install dependencies and extract the database:
.\setup.ps1
Or manually:
# Install dependencies
pip install -r requirements.txt
# Extract the exploit-db database (you already have the zip file)
# Extract exploitdb-main.zip to C:\Users\John\
2. Start the Server
# Option 1: Use the batch file
.\start.bat
# Option 2: Direct Python
python server.py
The server will start on stdio by default (for local MCP usage).
3. Connect to Open-WebUI
Method 1: Open-WebUI Admin Panel (Recommended)
-
Open Open-WebUI at http://localhost:3000
-
Go to Settings ā Admin Panel ā MCP Servers
-
Add a new MCP server:
- Name:
exploit-db - Type:
stdio - Command:
python - Args:
["C:\\Users\\John\\exploitdb-mcp-server\\server.py"] - Working Directory:
C:\Users\John\exploitdb-mcp-server
- Name:
-
Click Save and Restart the MCP connection
Method 2: Configuration File
Edit your Open-WebUI MCP configuration file (usually in ~/.openwebui/mcp.json or similar):
{
"mcpServers": {
"exploit-db": {
"command": "python",
"args": ["C:\\Users\\John\\exploitdb-mcp-server\\server.py"],
"cwd": "C:\\Users\\John\\exploitdb-mcp-server",
"env": {
"EXPLOITDB_PATH": "C:\\Users\\John\\exploitdb-main"
}
}
}
}
Method 3: Docker Open-WebUI
If running Open-WebUI in Docker, you'll need to:
- Mount the MCP server directory as a volume
- Install Python in the container
- Configure the MCP server path
Example docker-compose addition:
volumes:
- C:\Users\John\exploitdb-mcp-server:/mcp/exploitdb
- C:\Users\John\exploitdb-main:/data/exploitdb-main
environment:
- EXPLOITDB_PATH=/data/exploitdb-main
Available Tools
Once connected, your AI agent can use these tools:
search_exploits
Search the exploit database by keyword, platform, or type.
Example prompts:
- "Search for Apache exploits"
- "Find Windows privilege escalation exploits"
- "Search for remote code execution exploits in Linux"
search_by_cve
Search for exploits by CVE identifier.
Example prompts:
- "Find exploits for CVE-2024-1234"
- "What exploits exist for CVE-2023-12345?"
get_exploit_code
Retrieve the full exploit code by EDB-ID.
Example prompts:
- "Get the code for exploit 51234"
- "Show me EDB-51234"
search_shellcodes
Search for shellcodes in the database.
Example prompts:
- "Find Linux x86 shellcodes"
- "Search for bind shell shellcodes"
list_platforms
List all available platforms with exploit counts.
Example prompts:
- "What platforms are available?"
- "Show me platform statistics"
get_database_stats
Get comprehensive database statistics.
Example prompts:
- "What's in the exploit database?"
- "Show me database statistics"
Usage Examples
In Open-WebUI Chat
Once configured, you can chat with your AI assistant like this:
You: I need to test a Windows Server 2019 system for privilege escalation vulnerabilities.
What exploits are available?
AI: Let me search for Windows privilege escalation exploits.
[Uses search_exploits tool]
I found 47 Windows privilege escalation exploits. Here are the most relevant:
1. EDB-51234 - Windows Token Privilege Escalation (2024)
2. EDB-49876 - Windows Service Binary Hijacking (2023)
...
You: Show me the code for EDB-51234
AI: [Uses get_exploit_code tool]
Here's the full exploit code...
Creating a Pentesting Agent
You can create a custom agent in Open-WebUI with a system prompt like:
You are a penetration testing assistant with access to the Exploit-DB database.
Your capabilities:
- Search for exploits by keyword, CVE, platform, or type
- Retrieve full exploit code and PoC scripts
- Find relevant shellcodes for various platforms
- Provide context and remediation advice
Always:
1. Confirm the target system details before suggesting exploits
2. Explain the exploit and its requirements
3. Provide ethical hacking context and responsible disclosure guidelines
4. Suggest remediation steps alongside vulnerabilities
Remember: This tool is for authorized penetration testing only.
Database Information
The Exploit-DB database contains:
- 50,000+ exploits and proof-of-concepts
- 10,000+ shellcodes
- Coverage from 1998 to present
- Multiple platforms: Linux, Windows, macOS, Hardware, etc.
- Various types: Remote, Local, WebApps, DoS, etc.
Troubleshooting
Server won't start
- Check Python is installed:
python --version - Verify dependencies:
pip install -r requirements.txt - Check the database is extracted:
dir %USERPROFILE%\exploitdb-main
"Database not found" error
- Extract
exploitdb-main.ziptoC:\Users\John\ - Or set
EXPLOITDB_PATHenvironment variable to your database location
Open-WebUI not detecting tools
- Restart Open-WebUI after configuring MCP
- Check MCP server logs in Open-WebUI admin panel
- Verify the Python path is correct in the configuration
Slow searches
- Optional: Install
searchsploitfrom https://www.exploit-db.com/searchsploit - The server will automatically use it for faster searches
- Without it, CSV parsing is slower but still functional
Security Notes
ā ļø Important Security Considerations:
- Authorized Testing Only - Use this tool only on systems you have explicit permission to test
- Local Use - Keep this server local; don't expose it to the internet
- Responsible Disclosure - Follow responsible disclosure practices for any vulnerabilities found
- Ethical Hacking - This tool is for legitimate security research and testing
Contributing
To extend this server:
- Add new tools in
server.pyusing the@mcp.tool()decorator - Follow the FastMCP documentation for tool creation
- Test with the MCP Inspector:
npx @modelcontextprotocol/inspector python server.py
Support
Issues? Check:
- FastMCP docs: https://github.com/jlowin/fastmcp
- MCP specification: https://modelcontextprotocol.io
- Exploit-DB: https://www.exploit-db.com
License
This MCP server wrapper is provided as-is for educational and authorized security testing purposes. The Exploit-DB database is copyright Offensive Security and subject to their terms of use.
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.