appsecco / vulnerable-mcp-servers-labView external linksLinks
A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
☆220Dec 18, 2025Updated last month
Alternatives and similar repositories for vulnerable-mcp-servers-lab
Users that are interested in vulnerable-mcp-servers-lab are comparing it to the libraries listed below
Sorting:
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Dec 3, 2025Updated 2 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆74Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Sep 10, 2025Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 5 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Remote CLI tools at your fingertips☆16Jul 31, 2024Updated last year
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆53Feb 5, 2026Updated last week
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 6 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Nov 14, 2025Updated 3 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Jan 2, 2025Updated last year
- ☆18Feb 2, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- frida-codeshare-scripts.collection of useful FRIDA scripts.A curated list of Frida resources.纯实用frida脚本收集,脚本全网最全.不定时同步更新.☆102Dec 6, 2025Updated 2 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆94Oct 15, 2025Updated 4 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- ☆30Dec 3, 2025Updated 2 months ago
- ☆51Jun 13, 2024Updated last year
- ☆20Aug 21, 2021Updated 4 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆32Nov 27, 2025Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- ☆96Aug 3, 2025Updated 6 months ago
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated last month
- Collect IAM information from all your AWS organization, accounts, and resources.☆85Feb 7, 2026Updated last week
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆167Dec 7, 2025Updated 2 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- Gixy-Next: NGINX Configuration Security Scanner & Performance Checker☆137Jan 15, 2026Updated last month
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Jan 25, 2025Updated last year
- fqdn_parser (Fully Qualified Domain Name Parser) is a library for parsing FQDNs into their component parts, as well as providing addition…☆28Jul 20, 2024Updated last year
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆57Dec 21, 2025Updated last month
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆44Sep 19, 2025Updated 4 months ago
- One Conference 2024☆111Oct 1, 2024Updated last year