ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆19Updated 10 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 10 months ago
- Agentic pentest tooling☆133Updated this week
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Updated 2 months ago
- Cloud subdomains identification tool☆62Updated 9 months ago
- ☆195Updated 9 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 2 months ago
- ☆20Updated last month
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆231Updated this week
- ☆105Updated 4 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Updated last month
- ☆242Updated last month
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆218Updated last month
- ☆101Updated this week
- Simple web app to track OWASP WSTG security testing progress☆27Updated 4 months ago
- ☆82Updated 5 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆89Updated 7 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Updated 7 months ago
- ☆20Updated 9 months ago
- ☆144Updated 8 months ago
- Payloads for AI Red Teaming and beyond☆314Updated 5 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Updated last month
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆92Updated this week
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆52Updated 5 months ago
- A research project to add some brrrrrr to Burp☆197Updated 11 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆335Updated 8 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆140Updated 2 months ago