MorDavid / ExternalAttacker-MCPLinks
A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
β67Updated 7 months ago
Alternatives and similar repositories for ExternalAttacker-MCP
Users that are interested in ExternalAttacker-MCP are comparing it to the libraries listed below
Sorting:
- Verizon Burp Extensions: AI Suiteβ141Updated 7 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ45Updated 7 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asseβ¦β23Updated 4 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.β50Updated 10 months ago
- Cloud subdomains identification toolβ61Updated 7 months ago
- β35Updated 7 months ago
- A fast and comprehensive tool for organizational network scanningβ135Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.β111Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.β62Updated last week
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networβ¦β55Updated last month
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Maβ¦β45Updated 4 months ago
- Burp Suite Extension for inserting a magic byte into responder's requestβ24Updated 2 years ago
- β54Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercisesβ165Updated last year
- A tool for quickly evaluating IAM permissions in AWS.β60Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ27Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etcβ¦β83Updated 8 months ago
- Azure Service Subdomain Enumerationβ67Updated last year
- This is an AD pentest tools collectionβ59Updated last year
- AI/LLM local model integration for analysis of reconftw resultsβ84Updated 6 months ago
- A real fake social engineering appβ127Updated 4 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security β¦β56Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegatβ¦β35Updated 3 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β103Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.β38Updated 7 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through itβ51Updated 2 weeks ago
- Workshop & Talk Slide Decks from HackSpaceConβ25Updated last year
- Burp extension for Recursive Request Exploits (RRE) β DEFCON 2025β102Updated 3 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unliβ¦β43Updated 5 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β128Updated 3 years ago