ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆14Updated 5 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆48Updated 4 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆130Updated this week
- Cloud subdomains identification tool☆61Updated 4 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆266Updated 2 months ago
- ☆189Updated 4 months ago
- ☆96Updated 3 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆123Updated last week
- An archive of 0day.today exploits☆155Updated last month
- Payloads for AI Red Teaming and beyond☆257Updated last month
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 4 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated last month
- ☆124Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆103Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- FrogPost: postMessage Security Testing Tool☆95Updated 3 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆321Updated this week
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆41Updated 2 weeks ago
- ☆35Updated 5 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆82Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated last week
- A research project to add some brrrrrr to Burp☆185Updated 6 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆122Updated 5 months ago
- ☆17Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆369Updated last month
- Vast.ai Password Kracking☆83Updated 2 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆66Updated 3 weeks ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆73Updated 2 weeks ago