☆34Jul 9, 2025Updated 9 months ago
Alternatives and similar repositories for node-red-mcp-server
Users that are interested in node-red-mcp-server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 29, 2021Updated 4 years ago
- ☆10May 8, 2018Updated 7 years ago
- CSV fuzzer/anonymizer☆10Apr 17, 2026Updated last week
- ☆10Dec 24, 2022Updated 3 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 10 months ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- copy of https://bitbucket.org/dirkbaechle/profile/repositories☆11Feb 15, 2021Updated 5 years ago
- Uber Eats for Home Assistant☆13Jan 20, 2026Updated 3 months ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ☆12Oct 3, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Apr 16, 2017Updated 9 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆14Aug 17, 2018Updated 7 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 4 months ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Mar 9, 2023Updated 3 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆13Jun 19, 2024Updated last year
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- ☆15Oct 25, 2022Updated 3 years ago
- A local development environment for https://usetrmnl.com devices☆18Feb 25, 2025Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆15Mar 28, 2015Updated 11 years ago
- ☆18Dec 20, 2024Updated last year
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago