CyberSecurityUP / Offensive-MCP-AILinks
☆15Updated 5 months ago
Alternatives and similar repositories for Offensive-MCP-AI
Users that are interested in Offensive-MCP-AI are comparing it to the libraries listed below
Sorting:
- ☆17Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 2 months ago
- Living Off Security Tools☆51Updated 10 months ago
- ☆78Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- ☆31Updated 3 weeks ago
- Adversary Simulation Framework☆32Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆59Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 6 months ago
- This is a repository to experiment with MCP for security☆43Updated 7 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- ☆21Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- ☆19Updated 4 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆43Updated last month
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 5 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 8 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- ☆10Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆45Updated 5 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Living off the False Positive!☆40Updated 7 months ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆31Updated 6 months ago