ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆16Updated 5 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆59Updated 5 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆282Updated 3 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- An archive of 0day.today exploits☆166Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Payloads for AI Red Teaming and beyond☆280Updated 3 weeks ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆128Updated 3 weeks ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated last month
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆86Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- ☆190Updated 4 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 5 months ago
- ☆124Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 5 months ago
- ☆98Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆133Updated 2 weeks ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- A real fake social engineering app☆127Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆97Updated last week
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆99Updated last month
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆81Updated last month
- A research project to add some brrrrrr to Burp☆189Updated 7 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆21Updated 2 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆97Updated last week
- ☆19Updated last week
- ☆166Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆210Updated 5 months ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year