ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆16Updated 8 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆67Updated 7 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 7 months ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆155Updated 2 months ago
- An archive of 0day.today exploits☆312Updated 3 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆307Updated 5 months ago
- ☆35Updated 7 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 5 months ago
- ☆190Updated 7 months ago
- Payloads for AI Red Teaming and beyond☆302Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆108Updated 4 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆23Updated 4 months ago
- Protection against HTML smuggling attacks.☆99Updated 4 months ago
- ☆18Updated 7 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 7 months ago
- ☆80Updated 2 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆383Updated 3 months ago
- A security system to protect your vibecoded apps☆169Updated 3 weeks ago
- ☆100Updated last month
- FrogPost: postMessage Security Testing Tool☆98Updated last week
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆55Updated last month
- ☆129Updated 5 months ago
- Vast.ai Password Kracking☆89Updated 3 weeks ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 3 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 5 months ago
- ☆47Updated 8 months ago
- A real fake social engineering app☆127Updated 4 months ago