A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
☆232Dec 18, 2025Updated 2 months ago
Alternatives and similar repositories for vulnerable-mcp-servers-lab
Users that are interested in vulnerable-mcp-servers-lab are comparing it to the libraries listed below
Sorting:
- ☆21Updated this week
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆84Dec 3, 2025Updated 3 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆145Nov 14, 2025Updated 3 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Mar 3, 2026Updated last week
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated last week
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- A minimalist and lightweight starter kit that that utilises Pico for beautiful plug-and-play landing page UI blocks.☆16Feb 26, 2026Updated last week
- Remote CLI tools at your fingertips☆16Jul 31, 2024Updated last year
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆42Nov 13, 2025Updated 3 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆112Jan 2, 2025Updated last year
- Enables scanning of docker builds in CircleCi for OS package vulnerabilities.☆13Mar 6, 2020Updated 6 years ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- ☆18Feb 2, 2026Updated last month
- ReARM - Release-Level Supply Chain Evidence Platform. SBOMs, xBOMs and every other artifact - stored for 10+ years, versioned and audit-r…☆92Mar 3, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆37Jan 3, 2026Updated 2 months ago
- frida-codeshare-scripts.collection of useful FRIDA scripts.A curated list of Frida resources.纯实用frida脚本收集,脚本全网最全.不定时同步更新.☆102Dec 6, 2025Updated 3 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆98Oct 15, 2025Updated 4 months ago
- ☆32Dec 3, 2025Updated 3 months ago
- ☆51Jun 13, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated last month
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆33Nov 27, 2025Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 2 months ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 3 months ago
- ☆24May 17, 2022Updated 3 years ago