MorDavid / awesome-cyber-security-mcpLinks
☆30Updated this week
Alternatives and similar repositories for awesome-cyber-security-mcp
Users that are interested in awesome-cyber-security-mcp are comparing it to the libraries listed below
Sorting:
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆27Updated 7 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆30Updated 7 months ago
- ☆18Updated 7 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- This is a repository to experiment with MCP for security☆41Updated 6 months ago
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆74Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 11 months ago
- ☆17Updated 3 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- Penetration Testing AI Assistant based on open source LLMs.☆90Updated 3 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆69Updated last month
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 2 months ago
- ☆54Updated 6 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆47Updated 8 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆25Updated 3 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆72Updated 6 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated last month
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- An Interface for AI built for cybersecurity professionals☆92Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆37Updated 3 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆147Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆100Updated 3 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- ☆91Updated 2 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆76Updated last month