MCP Monitoring with eBPF
☆509Jan 16, 2026Updated 4 months ago
Alternatives and similar repositories for MCPSpy
Users that are interested in MCPSpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆44Apr 13, 2026Updated last month
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆12Apr 27, 2026Updated 3 weeks ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Simple and clear Rust implementation of the Af_XDP socket and XDP helpers.☆27Apr 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Take this course to learn how to create fine-grained, least-privilege HashiCorp Vault roles for GitHub Action workflows using GitHub OIDC…☆15May 8, 2026Updated last week
- ☆389Apr 15, 2026Updated last month
- An index of publicly available and open-source threat detection rulesets.☆135Apr 17, 2025Updated last year
- NOVA: The Prompt Pattern Matching☆133May 1, 2026Updated 2 weeks ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 11 months ago
- a web logging proxy for MCP client-server communication☆29Aug 17, 2025Updated 9 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 10 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆13Dec 14, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆22Nov 9, 2023Updated 2 years ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆353Jun 2, 2025Updated 11 months ago
- A curated list of AI driven Cyber security Resources☆50May 10, 2026Updated last week
- Google Maps for AWS IAM☆273May 12, 2026Updated last week
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 8 months ago
- A tool to help programmers debug and analyze Linux Kernel BPF verification failures.☆92Dec 3, 2025Updated 5 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆22Dec 2, 2025Updated 5 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆36Oct 17, 2024Updated last year
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆339May 6, 2026Updated 2 weeks ago
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- This project is a minimal eBPF-based Layer 4 (Transport Layer) network monitor that uses tc (Traffic Control) hooks to trace ingress and …☆29Aug 26, 2025Updated 8 months ago
- Automating situational awareness for cloud penetration tests.☆2,382Apr 21, 2026Updated 3 weeks ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,936Feb 13, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated last year
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated 2 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Apr 5, 2026Updated last month
- Bunch of BOF files☆41Jun 30, 2025Updated 10 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year