See what your AI agents can access. Scan MCP configs for exposed secrets, shadow APIs, and AI models. Generate AI-BOMs for compliance.
☆146Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for mcp-audit
Users that are interested in mcp-audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆37May 27, 2025Updated 11 months ago
- ☆15Jun 28, 2024Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆16Updated this week
- Cybersecurity Architects Handbook, published by Packt☆28Mar 27, 2024Updated 2 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- ☆13Dec 24, 2024Updated last year
- Personal eJPT study notes, cheat sheets, and CTF practice.☆47Nov 22, 2025Updated 5 months ago
- ☆21Dec 1, 2021Updated 4 years ago
- ☆17Mar 8, 2024Updated 2 years ago
- XDP Based Lightweight and Fast Firewall☆69Feb 23, 2026Updated 2 months ago
- Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC☆41Nov 19, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Writeups for TryHackMe and HackTheBox.☆21Apr 12, 2026Updated 2 weeks ago
- Code for our AWS Certified Advanced Networking Specialty course☆19Jan 9, 2026Updated 3 months ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated last year
- The GitHub Action for Microsoft Application Inspector☆16Jul 10, 2025Updated 9 months ago
- ☆10May 14, 2025Updated 11 months ago
- ☆41Mar 3, 2026Updated last month
- Repository for Red Hat OpenShift Container Platform (commands, cheatsheet, and manymore!)☆19May 30, 2024Updated last year
- A minimal cross-platform C++ build automation tool written in Python☆11Sep 23, 2025Updated 7 months ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Simple logfmt CLI tool for colorizing, analyzing, filtering, and formatting structured logs☆41Aug 27, 2025Updated 8 months ago
- ☆12Jan 30, 2025Updated last year
- Material for Talk Python Training course on Getting Started with Dask.☆29Dec 15, 2022Updated 3 years ago
- Source code for Part 1 of Hands on APIs for AI and Data Science☆30Mar 10, 2025Updated last year
- 🐕 Linux security audit tool☆47Feb 7, 2026Updated 2 months ago
- APIsec|SCAN - Free API security testing using Github actions☆103May 2, 2024Updated last year
- USB testing framework☆14May 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sample web application based on k8s☆18Apr 17, 2026Updated last week
- Haml-inspired JSX syntax for CoffeeScript☆10Sep 5, 2017Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 9 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 11 months ago