ADEOSec / mcp-shodanLinks
The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
☆16Updated 7 months ago
Alternatives and similar repositories for mcp-shodan
Users that are interested in mcp-shodan are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆62Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- Cloud subdomains identification tool☆61Updated 6 months ago
- Proximity is a MCP security scanner powered with NOVA☆53Updated last month
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- ☆190Updated 6 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆151Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆108Updated 3 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆299Updated 4 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 6 months ago
- An archive of 0day.today exploits☆294Updated 3 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆127Updated last month
- Payloads for AI Red Teaming and beyond☆296Updated 2 months ago
- ☆19Updated last month
- A research project to add some brrrrrr to Burp☆194Updated 8 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆182Updated last month
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- ☆173Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆98Updated last week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆219Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated 2 months ago
- Vast.ai Password Kracking☆87Updated this week
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 4 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 4 months ago
- Everything and anything related to password spraying☆148Updated last year
- Abuse trust-boundaries to bypass firewalls and network controls☆379Updated 3 months ago