A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP server implementations.
☆124Dec 14, 2025Updated 3 months ago
Alternatives and similar repositories for mcp-watch
Users that are interested in mcp-watch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 9 months ago
- MCP security wrapper☆217Mar 2, 2026Updated 3 weeks ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Feb 2, 2026Updated last month
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated last month
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 3 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Firefox and Chrome addon to provide food.gov.uk hygiene scores in Just Eat and Hungry House search results☆11Apr 8, 2020Updated 5 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- ☆28Dec 26, 2025Updated 3 months ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- Code snippets to reproduce MCP tool poisoning attacks.☆191Apr 10, 2025Updated 11 months ago
- boostsecurityio/poutine☆392Mar 20, 2026Updated last week
- ☆46Nov 7, 2024Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated this week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆201Mar 17, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆23Mar 4, 2025Updated last year
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆61Jul 7, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆86Mar 14, 2026Updated 2 weeks ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆35Feb 16, 2026Updated last month
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Mar 19, 2026Updated last week
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆221Updated this week
- A plugin-based gateway that orchestrates other MCPs and allows developers to build upon it enterprise-grade agents.☆360Jan 22, 2026Updated 2 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Develop Enhancements, Future Implementations and New Education☆15Nov 27, 2023Updated 2 years ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago