MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols
☆29Sep 24, 2025Updated 5 months ago
Alternatives and similar repositories for MCPSecBench
Users that are interested in MCPSecBench are comparing it to the libraries listed below
Sorting:
- ☆30Mar 12, 2025Updated 11 months ago
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- ☆43Feb 9, 2026Updated 2 weeks ago
- A Multi-Session and Multi-Therapy Benchmark for High-Realism AI Psychological Counselor☆29Jan 13, 2026Updated last month
- An implementation of MSSRM method☆11Mar 23, 2023Updated 2 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- 2020湖南省第一届人工智能大赛参赛作品☆11Feb 17, 2022Updated 4 years ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- ☆14May 1, 2023Updated 2 years ago
- Code release for "Category-Specific Prompts for Animal Action Recognition with Pretrained Vision-Language Models"☆14Feb 21, 2024Updated 2 years ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated 10 months ago
- ☆25Sep 3, 2025Updated 5 months ago
- Code for Rethinking Prompt Optimizers: From Prompt Merits to Optimization☆12Jan 12, 2026Updated last month
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- The repo for using the model https://huggingface.co/thu-coai/Attacker-v0.1☆13Apr 23, 2025Updated 10 months ago
- Implementation of "Semi-Supervised Crowd Counting with Contextual Modeling: Facilitating Holistic Understanding of Crowd Scenes"☆12Oct 2, 2024Updated last year
- DETR tensor去除推理过程无用辅助头+fp16部署再次加速+解决转tensorrt 输出全为0问题的新方法。☆12Jan 9, 2024Updated 2 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Exploring advanced prompting tools to query SQL database with multiple tables in natural language using LLMs☆16Aug 23, 2024Updated last year
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- ☆11Sep 12, 2021Updated 4 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆28Nov 10, 2025Updated 3 months ago
- ☆11Mar 22, 2024Updated last year
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- ☆11Dec 3, 2014Updated 11 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- ☆14Sep 11, 2025Updated 5 months ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- official implementation of Training-free Boost for Open-Vocabulary Object Detection with Confidence Aggregation☆13Apr 15, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- ☆13Jun 15, 2024Updated last year
- ☆14Aug 28, 2023Updated 2 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- ☆10Feb 17, 2024Updated 2 years ago