Exploit Intelligence Platform MCP Server
eip-mcp connects AI assistants to the Exploit Intelligence Platform via the Model Context Protocol. 17 tools to search vulnerabilities, analyze exploits, audit tech stacks, and generate pentest findings — with real-time data from NVD, CISA KEV, VulnCheck KEV, InTheWild.io, ENISA EUVD, EPSS, ransomware attribution, ExploitDB, Metasploit, GitHub, and more.
Try It Now — No Installation Required
A live remote MCP endpoint is available at
mcp.exploit-intel.com/mcp.
Connect directly from your AI client — no Python, no pip, no setup. Same 17 tools, real-time data.
Local Installation
Requires Python 3.10+. Install with pipx (recommended) or a virtual environment.
Kali 2024+ blocks global pip installs. Use the APT repo, pipx, or a virtual environment.
Connect to Your AI
Restart your AI client after editing config. If it cannot find eip-mcp, switch to the full venv binary path.
Tools (17)
What to Ask Your AI
Just describe what you need in natural language. The AI picks the right tools automatically.
Real Examples
All output below is from real queries against the live platform.
search_exploits with llm_classification=trojanFound 21 exploits:
★0 github hn1e13/test-mcp
CVE-2025-54135 HIGH CVSS:8.5 [markdown] trojan
AI: RCE | trivial | theoretical
!! Embedded AI automation commands disguised as configuration
!! Decoy Python script unrelated to the vulnerability
★1 github Markusino488/cve-2025-8088
CVE-2025-8088 HIGH CVSS:8.8 [python] trojan
AI: other | moderate | reliable
!! Misleading README describing a security tool
!! Suspicious download links pointing to the same ZIP file
search_exploits with attack_type=RCE, reliability=reliable, sort=stars_descFound 17,720 exploits:
★4275 nomisec zhzyker/exphub
CVE-2020-14882 CRITICAL CVSS:9.8 working_poc
AI: RCE | moderate | reliable
★3436 nomisec fullhunt/log4j-scan
CVE-2021-44228 CRITICAL CVSS:10.0 scanner
AI: RCE | moderate | reliable
★1848 nomisec kozmer/log4j-shell-poc
CVE-2021-44228 CRITICAL CVSS:10.0 working_poc
AI: RCE | moderate | reliable
audit_stack with technologies=nginx, postgresql, redisSTACK AUDIT RESULTS
--- NGINX (66 exploitable CVEs) ---
CVE-2023-44487 HIGH CVSS:7.5 EPSS:94.4% Exploits:22 [KEV]
HTTP/2 Rapid Reset DoS
CVE-2017-7529 HIGH CVSS:7.5 EPSS:91.9% Exploits:54
Nginx <1.14 - Info Disclosure
--- POSTGRESQL (56 exploitable CVEs) ---
CVE-2019-9193 HIGH CVSS:7.2 EPSS:93.4% Exploits:41
PostgreSQL < 11.2 - OS Command Injection
--- REDIS (39 exploitable CVEs) ---
CVE-2022-0543 CRITICAL CVSS:10.0 EPSS:94.4% Exploits:32 [KEV]
Redis Lua Sandbox Escape
get_vulnerability — exploits with MITRE ATT&CK techniques and trojan deception detailCVE-2019-0708 [CRITICAL] [KEV]
BlueKeep RDP Remote Windows Kernel Use After Free
CVSS: 9.8 EPSS: 94.5% (100th percentile)
EXPLOITS (487 total):
METASPLOIT MODULES:
- cve_2019_0708_bluekeep_rce.rb Rank: manual
AI: RCE | complex | racy
MITRE: T1059, T1068 - Exploitation for Privilege Escalation
VERIFIED (ExploitDB):
- EDB-47416 verified
MITRE: T1068, T1210 - Exploitation of Remote Services
PROOF OF CONCEPT:
★1187 Ekultek/BlueKeep working_poc
AI: RCE | moderate | reliable
MITRE: T1189, T1068
*** TROJAN ***:
WARNING: ttsite/CVE-2019-0708-
Summary: The repository is a scam. No actual exploit code.
Deception indicators:
- False claims about exploit availability
- Deceptive contact information
get_nuclei_templates with cve_id=CVE-2024-27198NUCLEI TEMPLATES (1):
Template: CVE-2024-27198 [critical] [verified]
Name: TeamCity < 2023.11.4 - Authentication Bypass
Author: DhiyaneshDk
Tags: cve, cve2024, teamcity, jetbrains, auth-bypass, kev
Recon Queries:
Shodan: http.component:"TeamCity" || http.title:teamcity
FOFA: title=teamcity
Google: intitle:teamcity
Run: nuclei -t CVE-2024-27198 -u https://target.com
generate_finding — outputs a report-ready Markdown finding# CVE-2024-3400: PAN-OS Unauthenticated Remote Code Execution Severity: CRITICAL CVSS v3 Score: 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) EPSS Score: 94.3% probability of exploitation CISA KEV: Yes — confirmed actively exploited in the wild CWE: CWE-20, CWE-77 Affected Target: fw.corp.example.com ## Exploit Availability 43 public exploit(s) identified. - Metasploit: panos_telemetry_cmd_exec.rb (rank: excellent) ## MITRE ATT&CK Techniques - T1059 - Command and Scripting Interpreter - T1190 - Exploit Public-Facing Application - T1202 - Indirect Command Execution ...
get_author with author_name=ChocapikkAuthor: Chocapikk Exploits: 90 | Active since: 2017-04-25 ★244 CVE-2026-21858 Chocapikk/CVE-2026-21858 working_poc ★235 CVE-2023-29357 Chocapikk/CVE-2023-29357 working_poc ★179 CVE-2024-25600 Chocapikk/CVE-2024-25600 working_poc ★148 CVE-2023-22515 Chocapikk/CVE-2023-22515 working_poc ★134 CVE-2024-45519 Chocapikk/CVE-2024-45519 working_poc ★99 CVE-2024-3273 Chocapikk/CVE-2024-3273 working_poc ★86 CVE-2024-36401 Chocapikk/CVE-2024-36401 working_poc ... and 83 more exploits
Security
.., absolute paths, and null bytes