Security-hardened Chrome automation with post-quantum encryption (ML-KEM-768 + ChaCha20-Poly1305), secure credential vault, memory scrubbing, and audit logging. 22 tools for browser automation and sec
Security-hardened NotebookLM MCP with post-quantum encryption (ML-KEM-768), GDPR/SOC2/CSSF compliance, and 14 security layers. Query Google's Gemini-grounded research from Claude and AI agents.
Bridge AI assistants to 50+ Kali Linux security tools. Solve CTF challenges, perform penetration testing, and automate offensive security workflows across Pwnable, Crypto, Forensics, Cloud, and Web3.
MCP-native URL security scanner that protects AI agent workflows. Analyzes URLs for phishing, malware, and suspicious patterns before agent navigation. Returns risk scores, confidence levels, and agen
Find hands-on secure coding labs for vulnerabilities like XSS, SQL Injection, and OWASP Top 10 topics. Get a personalized learning pathway based on your GitHub or SecDim profile to accelerate your rem
av-weatheropen-api-secure
Audits any MCP server for command injection, path traversal, missing auth, hardcoded secrets, SQL injection, SSRF and tool poisoning. Returns grade A-F with CVE references. Malicious servers flagged n
MCP server for querying the ORKL API. This server provides tools for fetching threat reports, analyzing threat actors, and retrieving intelligence sources.
Explore the Arch Linux ecosystem with fast search across the Arch Wiki, AUR, and official repositories. Manage packages, updates, mirrors, and logs with built-in safety checks and clear, structured re
MCP server for RAD Security, providing AI-powered security insights for Kubernetes and cloud environments. This server provides tools for querying the Rad Security API and retrieving security findings
Execute JavaScript and Python code securely in isolated environments with comprehensive security restrictions. Pass dynamic input variables and receive detailed execution results including output, err
Enable AI models to interact with Windows command-line functionality securely and efficiently. Execute commands, create projects, and retrieve system information while maintaining strict security prot
Command line interface with secure execution and customizable security policies
Provision demo user identities to test and prototype workflows securely. Explore security trade-offs with contrasting examples. Generate and stream simple Python scripts for quick validation.
Validate concepts end-to-end across innovation, ethics, and security. Identify market opportunities, competitive positioning, privacy and fairness risks, and security vulnerabilities. Get a unified ve
Embeds Snyk's security engines into agentic workflows. Secures AI-generated code in real-time and accelerates the fixing vulnerability backlogs.
Generate cryptographically secure integers, floats, bytes, UUIDs, strings, booleans, and list selections. Ensure unpredictable, unbiased results for security-sensitive workflows, simulations, testing,
Parallel multi-model code review, security analysis, and AI debate with ChatGPT, Claude, and Gemini. Orchestrates multiple LLMs for compare, consensus, and OWASP Top 10 security checks.
Provide AI-powered security analysis and safety instruction tools to protect AI agents during MCP interactions. Analyze text content for harmful or inappropriate material and enhance user prompts with