fr0gger / MCP_SecurityLinks
This is a repository to experiment with MCP for security
☆40Updated 5 months ago
Alternatives and similar repositories for MCP_Security
Users that are interested in MCP_Security are comparing it to the libraries listed below
Sorting:
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- ☆17Updated 3 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- Living off the False Positive!☆37Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆118Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆44Updated 4 months ago
- ☆40Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆16Updated 3 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆61Updated this week
- ☆92Updated last month
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 3 weeks ago
- Examine Chrome extensions for security issues☆85Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- ☆17Updated 3 weeks ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 9 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆52Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆62Updated 2 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated last month
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated 3 weeks ago
- Strelka Web UI for File Submission and Analysis☆69Updated 3 weeks ago