This is a repository to experiment with MCP for security
☆47Jan 22, 2025Updated last year
Alternatives and similar repositories for MCP_Security
Users that are interested in MCP_Security are comparing it to the libraries listed below
Sorting:
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Mar 13, 2026Updated last week
- ☆23Mar 17, 2024Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆111Jan 27, 2026Updated last month
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Updated this week
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 4 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- ☆11Sep 26, 2019Updated 6 years ago
- ☆19Apr 28, 2025Updated 10 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Scrapes the Windows Evaluation ISO addresses into a JSON data file☆30Jan 28, 2026Updated last month
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Jan 9, 2018Updated 8 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Mar 12, 2026Updated last week
- AI agent set for cloud security purple teaming, runs inside Claude Code, Gemini CLI, and Codex.☆38Updated this week
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆42Mar 9, 2026Updated last week
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆30Jan 21, 2026Updated last month
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 10 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- ☆10Mar 7, 2019Updated 7 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆20Jan 9, 2026Updated 2 months ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- TCP over DNS tunnel b[l]ind written in go.☆16Dec 22, 2024Updated last year
- BCP documents and website of GCVE☆56Updated this week
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- A tool for mapping cyber crime☆236Jan 24, 2026Updated last month
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago