Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-tested exploit walkthroughs
☆85Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for mcp-breach-to-fix-labs
Users that are interested in mcp-breach-to-fix-labs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆65Jun 9, 2025Updated 9 months ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆120Mar 17, 2026Updated last week
- ☆11Jan 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 10, 2026Updated 2 weeks ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- AI Red Teaming Range☆124Mar 13, 2025Updated last year
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆261Feb 8, 2026Updated last month
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆242Dec 18, 2025Updated 3 months ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- ☆15Jul 23, 2024Updated last year
- Scripts to help with using gam for Google Workspace administration☆16Mar 7, 2024Updated 2 years ago
- Benchmarking LLM agents on Cyber Threat Investigation.☆118Feb 5, 2026Updated last month
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆27Mar 18, 2026Updated last week
- ☆16Mar 7, 2026Updated 3 weeks ago
- ☆22Mar 22, 2026Updated last week
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated 2 weeks ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆13Feb 28, 2025Updated last year
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated last month
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 6 months ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆33Feb 25, 2026Updated last month
- ☆14Apr 2, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The Developer's Guide to AI - From Prompts to Agents☆31Feb 27, 2026Updated last month
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆36Dec 23, 2025Updated 3 months ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Splunk Reference App - Pluggable Auditing System (PAS) - Code Repo☆23Jul 8, 2019Updated 6 years ago