The ExploitDB MCP Server provides AI assistants like Claude with access to security exploit and vulnerability information through the Model Context Protocol. This server enables searching and retrieving detailed information about security exploits, enhancing cybersecurity research capabilities.
Clone the repository:
git clone https://github.com/Cyreslab-AI/exploitdb-mcp-server.git
cd exploitdb-mcp-server
Install dependencies:
npm install
Build the project:
npm run build
Configure the server:
.env
file in the root directory based on .env.example
Initialize the database:
npm run update-db
Run the server:
node build/index.js
To use this server with Claude or other MCP-compatible assistants, add it to your MCP configuration:
{
"mcpServers": {
"mcp-exploitdb-server": {
"command": "node",
"args": ["/path/to/exploitdb-mcp-server/build/index.js"]
}
}
}
Use the search_exploits
tool to search for exploits in the database:
<use_mcp_tool>
<server_name>mcp-exploitdb-server</server_name>
<tool_name>search_exploits</tool_name>
<arguments>
{
"query": "wordpress plugin",
"platform": "php",
"limit": 5
}
</arguments>
</use_mcp_tool>
Additional search parameters:
type
: Filter by exploit type (e.g., webapps, remote, local)cve
: Filter by CVE IDauthor
: Filter by author namestart_date
/end_date
: Filter by date range (YYYY-MM-DD)verified
: Filter by verified status (true/false)offset
: For paginationUse the get_exploit
tool to retrieve detailed information about a specific exploit:
<use_mcp_tool>
<server_name>mcp-exploitdb-server</server_name>
<tool_name>get_exploit</tool_name>
<arguments>
{
"id": 12345,
"include_code": true
}
</arguments>
</use_mcp_tool>
Use the find_by_cve
tool to find all exploits related to a specific CVE:
<use_mcp_tool>
<server_name>mcp-exploitdb-server</server_name>
<tool_name>find_by_cve</tool_name>
<arguments>
{
"cve": "CVE-2021-44228",
"limit": 10
}
</arguments>
</use_mcp_tool>
Use the get_recent_exploits
tool to retrieve recently added exploits:
<use_mcp_tool>
<server_name>mcp-exploitdb-server</server_name>
<tool_name>get_recent_exploits</tool_name>
<arguments>
{
"limit": 10
}
</arguments>
</use_mcp_tool>
Use the get_statistics
tool to get insights about the exploits in the database:
<use_mcp_tool>
<server_name>mcp-exploitdb-server</server_name>
<tool_name>get_statistics</tool_name>
<arguments>
{}
</arguments>
</use_mcp_tool>
The server can be configured using environment variables or a .env
file:
Variable | Description | Default |
---|---|---|
CLONE_REPOSITORY |
Whether to clone the ExploitDB repository | false |
REPOSITORY_URL |
URL of the ExploitDB repository | https://gitlab.com/exploit-database/exploitdb.git |
CSV_URL |
URL of the ExploitDB CSV file | https://gitlab.com/exploit-database/exploitdb/-/raw/main/files_exploits.csv |
DATA_DIR |
Directory to store data | ./data |
DB_PATH |
Path to the SQLite database | ./data/exploitdb.sqlite |
UPDATE_INTERVAL |
Update frequency in hours (0 to disable) | 24 |
MAX_RESULTS |
Maximum number of results to return per query | 10 |
There are two ways to add an MCP server to Cursor. The most common way is to add the server globally in the ~/.cursor/mcp.json
file so that it is available in all of your projects.
If you only need the server in a single project, you can add it to the project instead by creating or adding it to the .cursor/mcp.json
file.
To add a global MCP server go to Cursor Settings > MCP and click "Add new global MCP server".
When you click that button the ~/.cursor/mcp.json
file will be opened and you can add your server like this:
{
"mcpServers": {
"cursor-rules-mcp": {
"command": "npx",
"args": [
"-y",
"cursor-rules-mcp"
]
}
}
}
To add an MCP server to a project you can create a new .cursor/mcp.json
file or add it to the existing one. This will look exactly the same as the global MCP server example above.
Once the server is installed, you might need to head back to Settings > MCP and click the refresh button.
The Cursor agent will then be able to see the available tools the added MCP server has available and will call them when it needs to.
You can also explictly ask the agent to use the tool by mentioning the tool name and describing what the function does.