Skip to main content

MCP server for searching Exploit-DB using searchsploit

Project description

MCP Exploit-DB Server

An MCP (Model Context Protocol) server that provides access to the Exploit-DB database using the searchsploit command-line tool. This allows AI assistants like Claude to search for and retrieve exploit information directly.

Prerequisites

  • Python 3.10 or higher
  • searchsploit command-line tool (from exploitdb package)

Installing searchsploit

On Kali Linux / Debian-based systems:

sudo apt update
sudo apt install exploitdb

On macOS with Homebrew:

brew install exploitdb

Installation on Claude Code and Desktop

  1. Clone or download the repository:
claude mcp add --transport stdio exploitdb -- venv/bin/python exploit_db/server.py

After updating the configuration claude_desktop_config.json, restart Claude Desktop (see sample file in the repo).

{
  "mcpServers": {
    "exploitdb": {
     "command": "/ABSOLUTE/PATH/TO/PARENT/FOLDER/venv/bin/python",
     "args": ["-m", "exploit_db.server"]
    }
  }
}

Available Tools

1. search_exploits

Search for exploits using keywords.

Parameters:

  • terms (required): Array of search terms (e.g., ["afd", "windows", "local"])
  • case_sensitive (optional): Perform case-sensitive search (default: false)
  • exact (optional): Exact match on exploit title (default: false)
  • strict (optional): Strict version matching (default: false)
  • title_only (optional): Search only in titles, not paths (default: false)
  • exclude (optional): Exclude terms from results (use | to separate)
  • json_output (optional): Return JSON format (default: false)
  • show_urls (optional): Show web URLs instead of local paths (default: false)

Example:

Search for Windows local privilege escalation exploits related to afd.sys

2. search_cve

Search for exploits by CVE identifier.

Parameters:

  • cve (required): CVE identifier (e.g., "2021-44228" or "CVE-2021-44228")
  • json_output (optional): Return JSON format (default: false)

Example:

Find exploits for CVE-2021-44228

3. get_exploit_path

Get the full local filesystem path to an exploit.

Parameters:

  • edb_id (required): Exploit-DB ID (e.g., "39446")

Example:

Get the path for exploit 39446

4. get_exploit_content

Retrieve and display the full content of an exploit.

Parameters:

  • edb_id (required): Exploit-DB ID (e.g., "39446")

Example:

Show me the content of exploit 39446

5. mirror_exploit

Copy an exploit file to a specified directory.

Parameters:

  • edb_id (required): Exploit-DB ID
  • destination (optional): Destination directory (default: current directory)

Example:

Copy exploit 39446 to /tmp

6. update_exploitdb

Update the local Exploit-DB database.

Example:

Update the exploit database

Usage Examples

Once configured, you can ask Claude questions like:

  • "Search for Apache Struts 2.0.0 exploits"
  • "Find exploits for CVE-2021-44228"
  • "Show me Windows kernel privilege escalation exploits"
  • "Get the content of exploit 39446"
  • "Search for Linux kernel 3.2 exploits excluding PoC and DoS"
  • "Find remote code execution exploits for PHP"

Credits

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_cyberroute_mcp_exploitdb-1.0.0.tar.gz (4.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_cyberroute_mcp_exploitdb-1.0.0.tar.gz.

File metadata

  • Download URL: iflow_mcp_cyberroute_mcp_exploitdb-1.0.0.tar.gz
  • Upload date:
  • Size: 4.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cyberroute_mcp_exploitdb-1.0.0.tar.gz
Algorithm Hash digest
SHA256 935323c94eb795278d791b5099c2a1b564241bbda90bd1244fa0c598b3c8a9c3
MD5 aa9b9c1437e60d1857c1f80032853a75
BLAKE2b-256 086357ccb2abc7bd22a8f4eec14f7dbeb69e1fb89431cd05deea3c54ccce5369

See more details on using hashes here.

File details

Details for the file iflow_mcp_cyberroute_mcp_exploitdb-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_cyberroute_mcp_exploitdb-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 5.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.9.28 {"installer":{"name":"uv","version":"0.9.28","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_cyberroute_mcp_exploitdb-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a79117a03f20c60dff38b169cef73ade23ec471fb0bac0607018c67cddb29434
MD5 cdf6ebe59989aad1b42e758ab94a3691
BLAKE2b-256 21a790e0323ca5234f84f23714b07c8276aeb4ccb4dcf926e127347fc96f6c19

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page