CyberSecurityUP / Offensive-MCP-AILinks
☆14Updated 4 months ago
Alternatives and similar repositories for Offensive-MCP-AI
Users that are interested in Offensive-MCP-AI are comparing it to the libraries listed below
Sorting:
- ☆17Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆44Updated 2 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 5 months ago
- Living Off Security Tools☆45Updated 10 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 5 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆78Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 2 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 8 months ago
- ☆19Updated 4 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 3 months ago
- ☆21Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆82Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 5 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated 3 weeks ago
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- Living off the False Positive!☆39Updated 6 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- This is a repository to experiment with MCP for security☆42Updated 7 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆48Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- Autonomous AI C2☆31Updated last year
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago