MCP Monitoring with eBPF
☆504Jan 16, 2026Updated 2 months ago
Alternatives and similar repositories for MCPSpy
Users that are interested in MCPSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆43Dec 24, 2025Updated 2 months ago
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆11Mar 18, 2025Updated last year
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆289May 16, 2025Updated 10 months ago
- ☆382Apr 18, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- NOVA: The Prompt Pattern Matching☆121Jan 27, 2026Updated last month
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆343Jun 2, 2025Updated 9 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Google Maps for AWS IAM☆271Updated this week
- A curated list of AI driven Cyber security Resources☆48Updated this week
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 6 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆21Dec 2, 2025Updated 3 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆340Mar 11, 2026Updated last week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- This project is a minimal eBPF-based Layer 4 (Transport Layer) network monitor that uses tc (Traffic Control) hooks to trace ingress and …☆30Aug 26, 2025Updated 6 months ago
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated last week
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,877Feb 13, 2026Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆141Apr 22, 2025Updated 11 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- tiktok tools | scrapping | automation☆31Nov 10, 2025Updated 4 months ago
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated last week
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆42Feb 20, 2026Updated last month
- Bunch of BOF files☆40Jun 30, 2025Updated 8 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆79Sep 16, 2025Updated 6 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year