Skip to main content

MCP server for searching Exploit-DB using searchsploit

Project description

MCP Exploit-DB Server

An MCP (Model Context Protocol) server that provides access to the Exploit-DB database using the searchsploit command-line tool. This allows AI assistants like Claude to search for and retrieve exploit information directly.

Prerequisites

  • Python 3.10 or higher
  • searchsploit command-line tool (from exploitdb package)

Installing searchsploit

On Kali Linux / Debian-based systems:

sudo apt update
sudo apt install exploitdb

On macOS with Homebrew:

brew install exploitdb

Installation on Claude Code and Desktop

  1. Clone or download the repository:
claude mcp add --transport stdio exploitdb -- venv/bin/python exploit_db/server.py

After updating the configuration claude_desktop_config.json, restart Claude Desktop (see sample file in the repo).

{
  "mcpServers": {
    "exploitdb": {
     "command": "/ABSOLUTE/PATH/TO/PARENT/FOLDER/venv/bin/python",
     "args": ["-m", "exploit_db.server"]
    }
  }
}

Available Tools

1. search_exploits

Search for exploits using keywords.

Parameters:

  • terms (required): Array of search terms (e.g., ["afd", "windows", "local"])
  • case_sensitive (optional): Perform case-sensitive search (default: false)
  • exact (optional): Exact match on exploit title (default: false)
  • strict (optional): Strict version matching (default: false)
  • title_only (optional): Search only in titles, not paths (default: false)
  • exclude (optional): Exclude terms from results (use | to separate)
  • json_output (optional): Return JSON format (default: false)
  • show_urls (optional): Show web URLs instead of local paths (default: false)

Example:

Search for Windows local privilege escalation exploits related to afd.sys

2. search_cve

Search for exploits by CVE identifier.

Parameters:

  • cve (required): CVE identifier (e.g., "2021-44228" or "CVE-2021-44228")
  • json_output (optional): Return JSON format (default: false)

Example:

Find exploits for CVE-2021-44228

3. get_exploit_path

Get the full local filesystem path to an exploit.

Parameters:

  • edb_id (required): Exploit-DB ID (e.g., "39446")

Example:

Get the path for exploit 39446

4. get_exploit_content

Retrieve and display the full content of an exploit.

Parameters:

  • edb_id (required): Exploit-DB ID (e.g., "39446")

Example:

Show me the content of exploit 39446

5. mirror_exploit

Copy an exploit file to a specified directory.

Parameters:

  • edb_id (required): Exploit-DB ID
  • destination (optional): Destination directory (default: current directory)

Example:

Copy exploit 39446 to /tmp

6. update_exploitdb

Update the local Exploit-DB database.

Example:

Update the exploit database

Usage Examples

Once configured, you can ask Claude questions like:

  • "Search for Apache Struts 2.0.0 exploits"
  • "Find exploits for CVE-2021-44228"
  • "Show me Windows kernel privilege escalation exploits"
  • "Get the content of exploit 39446"
  • "Search for Linux kernel 3.2 exploits excluding PoC and DoS"
  • "Find remote code execution exploits for PHP"

Credits

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_cyberroute_mcp_exploitdb-1.0.1.tar.gz (4.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_cyberroute_mcp_exploitdb-1.0.1.tar.gz.

File metadata

  • Download URL: iflow_mcp_cyberroute_mcp_exploitdb-1.0.1.tar.gz
  • Upload date:
  • Size: 4.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cyberroute_mcp_exploitdb-1.0.1.tar.gz
Algorithm Hash digest
SHA256 f25445ad23cf47f093cfc30900898fdb3f75d13359aadb53118fab3f2c62a0d0
MD5 1928ea7050c56191b7d60b72a52b19cd
BLAKE2b-256 4a15380b576842d705fe61ea97c753216dd799dca4698d30ed80daf5b95e5713

See more details on using hashes here.

File details

Details for the file iflow_mcp_cyberroute_mcp_exploitdb-1.0.1-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_cyberroute_mcp_exploitdb-1.0.1-py3-none-any.whl
  • Upload date:
  • Size: 5.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cyberroute_mcp_exploitdb-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 49c017d96a1ae7c5f9a56bf17e6dfb3bf8e0890596dcbe4a3cc5378401a5ef6c
MD5 62661d4d8fd79c06597d4ef9d30c0e4e
BLAKE2b-256 b67511f57d5325c0b1a7dc50b1caf52fbb9d20c6216816ffa2aee44f69680b02

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page