Cyreslab-AI / shodan-mcp-serverLinks
A Model Context Protocol server that provides access to Shodan API functionality
☆37Updated 6 months ago
Alternatives and similar repositories for shodan-mcp-server
Users that are interested in shodan-mcp-server are comparing it to the libraries listed below
Sorting:
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- ☆20Updated 9 months ago
- Knowledge base on cybercriminal concealment techniques☆91Updated 8 months ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Sniffing out well-known threat groups☆64Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 6 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 7 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 4 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆72Updated 3 months ago
- ☆74Updated this week
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆42Updated 5 months ago
- ☆17Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Updated 9 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 2 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆120Updated this week
- Complete AI-powered security training with 40+ labs, CTF challenges, and realistic DFIR datasets. Learn ML threat detection, LLM analysis…☆46Updated this week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆31Updated 5 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆23Updated 8 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Updated last month
- ☆56Updated 11 months ago