Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers
☆30Feb 20, 2026Updated last week
Alternatives and similar repositories for notebooklm-mcp-secure
Users that are interested in notebooklm-mcp-secure are comparing it to the libraries listed below
Sorting:
- Displays live video from the International Space Station on your MagicMirror².☆10Oct 29, 2025Updated 3 months ago
- ☆39Feb 14, 2026Updated last week
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- The modern, open-source writing studio for authors.☆19Jan 29, 2026Updated 3 weeks ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- About Install Qucheng , and related cloud-native add-ons, it supports all-in-one, multi-node, and HA 🔥 ⎈ 🐳☆11Nov 20, 2025Updated 3 months ago
- This is a full stack application where you can log all you places where you visited....-☆21Aug 26, 2021Updated 4 years ago
- ☆13Jul 9, 2024Updated last year
- Docker deployment configuration for Astral app - a GitHub stars organizer application with Laravel and PHP.☆13May 2, 2020Updated 5 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Microsoft Defender for Cloud attack simulation toolkit☆24Dec 24, 2024Updated last year
- A collection of agentic iOS/watchOS audit skills and playbooks for IDE agents and CLI tools. Extracted from the development of Haptix.☆38Jan 27, 2026Updated last month
- ☆14Jul 26, 2025Updated 7 months ago
- ☆17Jan 12, 2026Updated last month
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 3 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Elysia 中文文档☆14Updated this week
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- ☆10Jun 26, 2024Updated last year
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Azure Resource Graph example queries to build upon☆12Sep 20, 2019Updated 6 years ago
- How to really install tensorflow-gpu from source on a clean instance of Ubuntu☆11Sep 29, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Convert Batch (bat) files to Executable (exe) files with a converter made in Batch☆12Oct 19, 2021Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers