ibrahimsaleem / PentestThinkingMCPView external linksLinks
A systematic, AI-powered penetration testing reasoning engine (MCP server) for attack path planning, CTF/HTB solving, and automated pentest workflows. Features Beam Search, MCTS, attack step scoring, and tool recommendations.
☆28Aug 30, 2025Updated 5 months ago
Alternatives and similar repositories for PentestThinkingMCP
Users that are interested in PentestThinkingMCP are comparing it to the libraries listed below
Sorting:
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆114Jun 28, 2025Updated 7 months ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- [ICML 2025] Speak Easy: Eliciting Harmful Jailbreaks from LLMs with Simple Interactions☆14Sep 27, 2025Updated 4 months ago
- QL-Relax☆13Aug 12, 2025Updated 6 months ago
- Helm charts for deploying Malcolm☆16Jan 29, 2026Updated 2 weeks ago
- 抢小米手机☆12Mar 28, 2019Updated 6 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆14Oct 4, 2025Updated 4 months ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- Jeopardy CTF platform☆12Jan 3, 2023Updated 3 years ago
- 一些简单的scripts,慢慢push☆14Apr 18, 2024Updated last year
- Windows、Linux持久化套件/Windows, Linux persistence suite☆18May 17, 2024Updated last year
- ☆17Apr 30, 2024Updated last year
- 🎃 A Chrome extension to get back the Halloween Contribution Graph on GitHub☆13Nov 7, 2016Updated 9 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Code of paper: xJailbreak: Representation Space Guided Reinforcement Learning for Interpretable LLM Jailbreaking"☆17Mar 9, 2025Updated 11 months ago
- ☆14Sep 30, 2020Updated 5 years ago
- Core Submodule of Exploration C2☆23Jan 27, 2026Updated 2 weeks ago
- Security Harness Engineering for Robust Program Analysis☆111Jan 23, 2026Updated 3 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆19Dec 22, 2025Updated last month
- 哥斯拉Godzilla定制化插件,接收恶意类Base64编码与恶意类类名进行实例化,达到注入任意类型内存马的目的。☆43Dec 30, 2025Updated last month
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆17Oct 22, 2024Updated last year
- ☆17Sep 22, 2024Updated last year
- Wireshark dissector for Socket.IO traffic☆15Jul 26, 2016Updated 9 years ago
- ☆16Dec 23, 2021Updated 4 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year