kapilduraphe / okta-mcp-serverLinks
Okta MCP Server
☆15Updated 2 months ago
Alternatives and similar repositories for okta-mcp-server
Users that are interested in okta-mcp-server are comparing it to the libraries listed below
Sorting:
- The first AI agent for Okta! A secure, local-first AI agent that helps Okta administrators query their tenant data using natural language…☆20Updated last week
- This is a repository to experiment with MCP for security☆39Updated 5 months ago
- ThreatWorx Information Gathering Script (twigs) to discover assets like hosts, cloud instances, containers and repositories of projects.☆12Updated last week
- Terraform Provider for Okta PAM☆11Updated 3 weeks ago
- FedRAMP Requests For Comments (RFCs)☆18Updated this week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆53Updated this week
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆48Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆38Updated last week
- A tool for testing the efficacy of prompts and prompt + model combinations.☆77Updated 10 months ago
- ☆17Updated 2 months ago
- ☆244Updated this week
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last month
- An OpenAI API Compatible Honeypot Gateway☆16Updated 3 months ago
- ☆70Updated last week
- ☆20Updated 2 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆12Updated 3 weeks ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆28Updated 9 months ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆28Updated last week
- ☆132Updated last month
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 8 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated 11 months ago
- Harness the security superpowers of your cloud asset inventory☆11Updated 9 months ago
- ☆19Updated 4 months ago
- ☆12Updated last week
- A recon tool for GCP Service Account Keys that requires no permissions☆22Updated 2 months ago
- ☆39Updated 6 months ago
- Aftermath is a free macOS incident response framework☆32Updated 2 months ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆22Updated last week
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆11Updated 3 months ago