A systematic, AI-powered penetration testing reasoning engine (MCP server) for attack path planning, CTF/HTB solving, and automated pentest workflows. Features Beam Search, MCTS, attack step scoring, and tool recommendations.
☆28Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for PentestThinkingMCP
Users that are interested in PentestThinkingMCP are comparing it to the libraries listed below
Sorting:
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆125Feb 19, 2026Updated 2 weeks ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- 抢小米手机☆12Mar 28, 2019Updated 6 years ago
- 一些简单的scripts,慢慢push☆14Apr 18, 2024Updated last year
- Jeopardy CTF platform☆12Jan 3, 2023Updated 3 years ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- ☆17Apr 30, 2024Updated last year
- startup versions of container components☆20Updated this week
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Windows、Linux持久化套件/Windows, Linux persistence suite☆18May 17, 2024Updated last year
- ☆14Sep 30, 2020Updated 5 years ago
- Demo site for the chromium-detector library☆21Feb 11, 2026Updated 3 weeks ago
- Core Submodule of Exploration C2☆23Jan 27, 2026Updated last month
- Security Harness Engineering for Robust Program Analysis☆112Jan 23, 2026Updated last month
- ☆17Sep 22, 2024Updated last year
- ☆36Jul 1, 2025Updated 8 months ago
- ☆16Dec 23, 2021Updated 4 years ago
- 哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。☆44Dec 30, 2025Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆63Jan 5, 2026Updated 2 months ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- Exploit for CVE-2024-29847☆18Sep 15, 2024Updated last year
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- Inti easter challenge poc☆18May 4, 2021Updated 4 years ago
- 针对域名/页面的接口爬取,递归模式入库☆22Sep 18, 2019Updated 6 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- ☆39Nov 25, 2025Updated 3 months ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)☆22May 13, 2022Updated 3 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Aug 23, 2023Updated 2 years ago
- 用于检测gradle项目的第三方依赖组件是否存在安全漏洞。☆25Apr 12, 2022Updated 3 years ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated last month
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆202Sep 11, 2025Updated 5 months ago
- AWVS12&AWVS13 通用API批量导入脚本 AWVS12 & AWVS13 common API batch import script.☆25Mar 3, 2022Updated 4 years ago
- ☆22Sep 17, 2019Updated 6 years ago
- ☆31Dec 6, 2024Updated last year
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago