Adversis / mcp-snitchView external linksLinks
MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, and audit logging for AI tool usage.
☆93Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for mcp-snitch
Users that are interested in mcp-snitch are comparing it to the libraries listed below
Sorting:
- ☆21Sep 25, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- ☆12Nov 22, 2024Updated last year
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Sep 22, 2025Updated 4 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Sep 13, 2025Updated 5 months ago
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds☆56Feb 7, 2026Updated last week
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆92Jan 28, 2026Updated 2 weeks ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Feb 2, 2024Updated 2 years ago
- tail with regular expressions☆16May 20, 2020Updated 5 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆39Oct 14, 2025Updated 4 months ago
- ☆16Jul 31, 2021Updated 4 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆30Dec 3, 2025Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last week
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Sep 10, 2025Updated 5 months ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- An Evil OIDC Server☆54Oct 19, 2022Updated 3 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Jan 25, 2025Updated last year
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 9 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆29Apr 23, 2024Updated last year
- One Conference 2024☆111Oct 1, 2024Updated last year
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago