MCP Server for Metasploit
☆513Feb 5, 2026Updated last month
Alternatives and similar repositories for MetasploitMCP
Users that are interested in MetasploitMCP are comparing it to the libraries listed below
Sorting:
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.☆1,694Feb 25, 2026Updated last week
- ☆33Mar 19, 2025Updated 11 months ago
- ☆22Mar 24, 2025Updated 11 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 2 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- ☆19Jan 2, 2021Updated 5 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- MCP configuration to connect AI agent to a Linux machine.☆535Feb 26, 2026Updated last week
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 6 months ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆25Jan 17, 2026Updated last month
- Run GEPA on your favorite non-python libraries.☆33Jan 22, 2026Updated last month
- ☆20Sep 6, 2025Updated 5 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 10 months ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- ☆58Dec 10, 2025Updated 2 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆440Nov 3, 2025Updated 4 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated last month
- Decrypt Chromium based browser passwords with PowerShell.☆134Nov 14, 2025Updated 3 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Generate migrations for your Platformatic DB using a Prisma schema☆12Jan 26, 2024Updated 2 years ago
- Generate รูปคำคมแบบเด็กโอลิมปิควิชาการ☆11Jul 17, 2021Updated 4 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated 2 weeks ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆131Dec 8, 2025Updated 2 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- 清羽(ClearFeather)是一款专为网络安全攻防演练设计的资产智能清洗与分类工具。它能够自动化处理攻防演练中的各类资产数据,包括IP、域名、URL等,通过结合DeepSeek API的大语言模型能力和精准的正则表达式处理,实现资产的高效识别、分类与整理。☆23May 29, 2025Updated 9 months ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆34Feb 22, 2026Updated last week
- MCP Tools Usage From LangChain ReAct Agent / Example in TypeScript☆11Feb 13, 2026Updated 2 weeks ago
- Microsoft Graph CLI - Mail, Calendar, OneDrive, To-Do, Contacts☆49Jan 26, 2026Updated last month
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- ☆49Dec 21, 2025Updated 2 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆75Updated this week