eip-mcp

exploitintel/eip-mcp
★ 2 stars Python 🗄️ Database Updated 2d ago
Exploit Intelligence Platform MCP Server
View on GitHub →

Quick Install

Copy the config for your editor. Some servers may need additional setup — check the README.

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "eip-mcp": {
      "command": "uvx",
      "args": [
        "eip-mcp"
      ]
    }
  }
}

Or install with pip: pip install eip-mcp

README Excerpt

<!-- mcp-name: com.exploit-intel/eip-mcp --> Package/command: `eip-mcp` <p align="center"> <img src="https://exploit-intel.com/static/brand/mark-cyan.svg" width="160" alt="Exploit Intel Platform (EIP)" /> </p> An MCP (Model Context Protocol) server that gives AI assistants access to the [Exploit Intelligence Platform](https://exploit-intel.com) — vulnerability and exploit intelligence from NVD, CISA KEV, VulnCheck KEV, InTheWild.io, ENISA EUVD, OSV.dev, EPSS, ExploitDB, Metasploit, GitHub, and m

Tools (20)

EIP_MCP_HOSTEIP_MCP_PORTEIP_MCP_STATELESSEIP_MCP_TRANSPORTaudit_stackcheck_healthgenerate_findingget_authorget_cweget_exploit_analysisget_exploit_codeget_nuclei_templatesget_platform_statsget_vulnerabilitylist_authorslist_cweslist_productslist_vendorslookup_alt_idsearch_exploits

Topics

cvedatabaseexploitmcp-servervulnerability