fr0gger / MCP_SecurityLinks
This is a repository to experiment with MCP for security
☆45Updated 11 months ago
Alternatives and similar repositories for MCP_Security
Users that are interested in MCP_Security are comparing it to the libraries listed below
Sorting:
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- Open-source Fabric templates for cybersecurity and compliance☆28Updated last year
- Turn any blog into structured threat intelligence.☆43Updated last week
- ☆101Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆38Updated 2 weeks ago
- ☆20Updated 9 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 10 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated last week
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆21Updated 9 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 5 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated last month
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆18Updated 3 months ago
- Strelka Web UI for File Submission and Analysis☆74Updated last week
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆67Updated 4 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆90Updated 3 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆13Updated last year
- VTC - Velociraptor Timeline Creator☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆146Updated 2 weeks ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆152Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 2 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 3 months ago