pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.
☆58Mar 21, 2026Updated last month
Alternatives and similar repositories for pentestMCP
Users that are interested in pentestMCP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 7 months ago
- Webapp to perform regexp search over GitHub search.☆17Dec 2, 2022Updated 3 years ago
- A simple web viewer for TruffleHog JSON output.☆20Jan 7, 2026Updated 3 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆30Feb 27, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Apr 20, 2026Updated last week
- Fast http/https host scanner for find original IP behind CDN☆14Aug 21, 2025Updated 8 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated 2 months ago
- a minimalistic winrm client written in python☆28Apr 17, 2026Updated last week
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆26Mar 18, 2026Updated last month
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- ☆11Apr 21, 2026Updated last week
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆29Mar 8, 2026Updated last month
- 《Web安全教程之XXE漏洞》XML External Entity Injection.☆11Nov 1, 2025Updated 5 months ago
- ☆30Mar 25, 2026Updated last month
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆66Nov 12, 2025Updated 5 months ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 10 months ago
- Coze Plus是一款AI大模型知识库系统,帮助客户快速构建智能化的企业级供应商管理知识库、研发知识库、制造基地知识库、品质学习交流知识库、IT知识库、市场营销知识库系统,借助大模型的力量为你提供 AI 创作、AI 问答、AI 搜索等能力☆46Oct 25, 2025Updated 6 months ago
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- Proper sandboxing for agentic coding and web browsing☆219Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 6 months ago
- WALA 学习笔记☆14Aug 8, 2023Updated 2 years ago
- ☆11Mar 5, 2026Updated last month
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆62Updated this week
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Apache Shiro CVE-2022-32532☆13Jun 28, 2022Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Barcha is your Swiss‑Army knife for SQL Injection reconnaissance 🔍. Written in Go, it automates: Shodan enumeration of SSL hosts 🕵️♂️…☆30Apr 18, 2025Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆16Oct 3, 2024Updated last year
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 4 months ago