fr0gger / proximityLinks
Proximity is a MCP security scanner powered with NOVA
☆269Updated 3 months ago
Alternatives and similar repositories for proximity
Users that are interested in proximity are comparing it to the libraries listed below
Sorting:
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆132Updated 3 weeks ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆136Updated 3 weeks ago
- Red Teaming for AI and Cloud☆203Updated last month
- An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to know…☆116Updated last week
- NOVA: The Prompt Pattern Matching☆63Updated 2 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆152Updated this week
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆68Updated last month
- ☆233Updated 3 weeks ago
- ☆355Updated 3 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- AI Red Teaming Range☆114Updated 10 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 3 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆79Updated 5 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆333Updated this week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆108Updated 7 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆222Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆189Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- ☆82Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Updated 8 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆98Updated 5 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆232Updated 3 months ago
- ☆330Updated 2 weeks ago
- ☆186Updated 2 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated last week
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆194Updated last month
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 2 months ago