MCP server for Atomic Red Team
☆116Mar 16, 2026Updated last week
Alternatives and similar repositories for atomic-red-team-mcp
Users that are interested in atomic-red-team-mcp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Sep 1, 2025Updated 6 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆61Feb 12, 2026Updated last month
- Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.☆139Mar 16, 2026Updated last week
- ☆59Dec 10, 2025Updated 3 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Sep 2, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆137Mar 13, 2026Updated last week
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated last week
- Cyber threat intelligence tool suite.☆42Apr 3, 2025Updated 11 months ago
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated last month
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆45Mar 13, 2026Updated last week
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 5 months ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆63Jul 27, 2025Updated 7 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- One WSL BOF to rule them all☆163Jan 14, 2026Updated 2 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week