A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.
☆77Apr 6, 2025Updated 10 months ago
Alternatives and similar repositories for ExternalAttacker-MCP
Users that are interested in ExternalAttacker-MCP are comparing it to the libraries listed below
Sorting:
- MCP wrapper for Hashcat – automate hash cracking with natural language☆24Jun 5, 2025Updated 8 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Updated this week
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆33Apr 22, 2025Updated 10 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆336Jun 2, 2025Updated 9 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- ☆39Nov 25, 2025Updated 3 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last month
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- ☆14Nov 8, 2024Updated last year
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆49Apr 9, 2025Updated 10 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆227Mar 28, 2025Updated 11 months ago
- Red Team AI prompts☆49Dec 2, 2025Updated 3 months ago
- Discovering Typo Squatting on your domains!☆80Jul 30, 2024Updated last year
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆12Apr 5, 2025Updated 10 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- ☆38Feb 26, 2025Updated last year