A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.
☆242Dec 18, 2025Updated 3 months ago
Alternatives and similar repositories for vulnerable-mcp-servers-lab
Users that are interested in vulnerable-mcp-servers-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆149Nov 14, 2025Updated 4 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆85Dec 3, 2025Updated 3 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆98Oct 15, 2025Updated 5 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Nov 19, 2025Updated 4 months ago
- ☆30Mar 18, 2026Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated last month
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆21Feb 1, 2026Updated last month
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆78Mar 22, 2026Updated last week
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- ☆12Oct 24, 2025Updated 5 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆42Nov 13, 2025Updated 4 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 4 months ago
- Gixy-Next: NGINX Configuration Security Scanner & Performance Checker☆158Mar 3, 2026Updated 3 weeks ago
- How to design, build, and operate AI agents for infrastructure teams — safely. 13 chapters covering architecture, sandboxing, credentials…☆130Feb 26, 2026Updated last month
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 8 months ago
- ☆51Jun 13, 2024Updated last year
- Scan A2A agents for potential threats and security issues☆135Feb 16, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- One Conference 2024☆111Oct 1, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Mar 20, 2026Updated last week
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- ☆18Feb 2, 2026Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Sep 30, 2022Updated 3 years ago
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆92Mar 19, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆43Jul 17, 2025Updated 8 months ago
- Remote CLI tools at your fingertips☆16Jul 31, 2024Updated last year
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Nova-Proximity is a MCP and Agent Skills security scanner powered with NOVA☆287Updated this week