Repello-AI / mcp-exploit-demoView external linksLinks
This repository demonstrates a security vulnerability in MCP (Model Context Protocol ) servers that allows for remote code execution and data exfiltration through tool poisoning.
☆20Apr 21, 2025Updated 9 months ago
Alternatives and similar repositories for mcp-exploit-demo
Users that are interested in mcp-exploit-demo are comparing it to the libraries listed below
Sorting:
- PCFT Contract Sourcecode☆10Apr 26, 2021Updated 4 years ago
- This notebook analyzes Nginx access logs in order to estimate the capacity needed to survive a traffic spike.☆24Mar 10, 2014Updated 11 years ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- Oracle JET CRUD example with ADF BC REST☆10Jul 29, 2017Updated 8 years ago
- Beispiel Projekt des Scoring Bounded Contexts meiner DDD Schulung☆11Sep 4, 2025Updated 5 months ago
- Protect Your Secrets. Forever. Ultra-secure notes powered by blockchain.☆13Apr 29, 2025Updated 9 months ago
- Drop-in OIDC & Google A2A auth + Weaviate memory for Ollama, vLLM and any local LLM server.☆16Jan 17, 2026Updated 3 weeks ago
- AWS CIS Policy Set for Terraform☆17Jan 23, 2026Updated 3 weeks ago
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- ☆10Oct 6, 2020Updated 5 years ago
- This repository provides multiple approaches to auto-instrument Spring and Spring Boot using the OpenTelemetry java agent and -Instrument…☆13Mar 4, 2024Updated last year
- 一个分析大型语言模型系统提示词的研究项目☆71Oct 13, 2025Updated 4 months ago
- Made of Code Theme for TextMate 2.0☆21Jul 5, 2018Updated 7 years ago
- Python implementation of the Abelian Sandpile Model (Per Bak, Chao Tang, & Kurt Wiesenfeld, 1987)☆10Apr 19, 2015Updated 10 years ago
- Open-source keyboard firmware for Atmel AVR and Arm USB families☆14Jul 30, 2024Updated last year
- Navigating the sea of publications☆13Jan 3, 2016Updated 10 years ago
- ESP32_CAM meets Etch-A-Sketch => Etch-a-Selfie☆12Jul 30, 2019Updated 6 years ago
- Example project that demonstrates how you can present your skillset as a searchable tag cloud using d3☆12May 24, 2016Updated 9 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 5 years ago
- Freelancer is an Orchard Core CMS Theme based on a Start Bootstrap template. It includes a portfolio, about, and contact us form.☆11Jul 30, 2020Updated 5 years ago
- Notepad++ PythonScript plugin to randomize lines in the editor☆10Jun 17, 2013Updated 12 years ago
- ☆15Dec 18, 2017Updated 8 years ago
- Secure decentralized hierarchical coordination platform☆22Nov 19, 2022Updated 3 years ago
- Mender over-the-air software updater client for microcontrollers (MCUs).☆17Updated this week
- ☆12Oct 18, 2023Updated 2 years ago
- ☆12Sep 28, 2025Updated 4 months ago
- Rack middleware that provides Passbook web service endpoints.☆53Jul 7, 2019Updated 6 years ago
- sample implementation of deeploco☆15Nov 5, 2018Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆10Aug 12, 2017Updated 8 years ago
- Replication materials for "Identifying the Development and Application of Artificial Intelligence in Scientific Text"☆13Feb 18, 2020Updated 5 years ago
- A intro to RxJS for my talk Beginner Reactive Programming with RxJS☆10Apr 20, 2023Updated 2 years ago
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- A starter project written in Python3 Flask and Angular-Material.☆12Jul 19, 2017Updated 8 years ago
- Repository for the family history/pedigree project☆13Feb 8, 2023Updated 3 years ago
- A blockstore for ipfs that replaces pinning with counting and tagging☆13Nov 21, 2020Updated 5 years ago
- An application that generates art by inserting text at random points in the image file.☆12Apr 4, 2012Updated 13 years ago
- Python SAML2 library☆12Sep 30, 2011Updated 14 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago