ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆18Updated 9 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆73Updated 9 months ago
- ☆194Updated 8 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆219Updated this week
- Cloud subdomains identification tool☆63Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆88Updated 6 months ago
- ☆233Updated 2 weeks ago
- ☆19Updated 2 weeks ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆67Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated last month
- Payloads for AI Red Teaming and beyond☆315Updated 4 months ago
- FrogPost: postMessage Security Testing Tool☆105Updated last month
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- ☆20Updated 8 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆139Updated last month
- ☆103Updated 3 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆23Updated 6 months ago
- AI/LLM local model integration for analysis of reconftw results☆86Updated 8 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 3 weeks ago
- An archive of 0day.today exploits☆329Updated 5 months ago
- Proximity is a MCP security scanner powered with NOVA☆269Updated 3 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆89Updated 10 months ago
- ☆136Updated 7 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆326Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year