alex-ilgayev / MCPSpyView external linksLinks
MCP Monitoring with eBPF
☆497Jan 16, 2026Updated last month
Alternatives and similar repositories for MCPSpy
Users that are interested in MCPSpy are comparing it to the libraries listed below
Sorting:
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- ☆40Dec 24, 2025Updated last month
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- NOVA: The Prompt Pattern Matching☆95Jan 27, 2026Updated 3 weeks ago
- ☆381Apr 18, 2024Updated last year
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 5 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 6 months ago
- A tool to help programmers debug and analyze Linux Kernel BPF verification failures.☆84Dec 3, 2025Updated 2 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆54Feb 9, 2026Updated last week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆337Updated this week
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆38Jan 31, 2026Updated 2 weeks ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Droz_scan is a automated script, that runs all the queries of drozer in a single run☆26May 15, 2023Updated 2 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆21Dec 2, 2025Updated 2 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Jan 6, 2026Updated last month
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago