MorDavid / ExternalAttacker-MCPLinks
A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
☆37Updated last month
Alternatives and similar repositories for ExternalAttacker-MCP
Users that are interested in ExternalAttacker-MCP are comparing it to the libraries listed below
Sorting:
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆15Updated last month
- Cloud subdomains identification tool☆58Updated last month
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆41Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated last month
- Verizon Burp Extensions: AI Suite☆130Updated last month
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- Everything and anything related to password spraying☆138Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 2 months ago
- ☆53Updated 4 months ago
- LDAP Enumeration Tool for Pentesters☆47Updated last month
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆55Updated 6 months ago
- This is an AD pentest tools collection☆57Updated 11 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 8 months ago
- Simple netexec wraper with html repport☆19Updated last year
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- ☆55Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- ☆21Updated last week
- ☆75Updated 10 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆99Updated 2 weeks ago
- A Moodle Scanner☆42Updated 6 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- ☆40Updated this week
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- ☆84Updated 3 months ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year