A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, inspect, and analyze AWS infrastructure for security issues and misconfigurations.
☆81Jul 25, 2025Updated 7 months ago
Alternatives and similar repositories for aws-security-mcp
Users that are interested in aws-security-mcp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆55Apr 25, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆23Mar 4, 2025Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated last week
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- ☆31Oct 28, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- ☆46Nov 7, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- A plugin-based gateway that orchestrates other MCPs and allows developers to build upon it enterprise-grade agents.☆360Jan 22, 2026Updated 2 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆374Dec 6, 2025Updated 3 months ago
- EU focused compliance MCP server☆52Mar 17, 2026Updated last week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- TACOS framework structural details☆20May 12, 2025Updated 10 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- ✨ A customizable copilot-instructions.md ruleset & prompts to guide GitHub Copilot toward secure coding defaults in Java, Node.js, C# and…☆36Mar 17, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated last week
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 5 months ago
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆571Feb 22, 2026Updated last month
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆19Dec 2, 2024Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆73Sep 13, 2025Updated 6 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- ☆60May 25, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago