ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆16Updated 6 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆289Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆59Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 5 months ago
- ☆190Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 5 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 3 months ago
- ☆99Updated this week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆149Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated 2 months ago
- ☆19Updated 3 weeks ago
- Payloads for AI Red Teaming and beyond☆286Updated last month
- ☆125Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆375Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆232Updated this week
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- An archive of 0day.today exploits☆200Updated 2 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆212Updated 6 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆93Updated last month
- Everything and anything related to password spraying☆146Updated last year
- ☆35Updated 6 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆101Updated 3 weeks ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆149Updated 2 weeks ago
- A research project to add some brrrrrr to Burp☆191Updated 8 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆21Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- A real fake social engineering app☆127Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆80Updated 8 months ago