Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tools over HTTP & SSE.
☆33Jan 3, 2026Updated last month
Alternatives and similar repositories for MCP-Scanner
Users that are interested in MCP-Scanner are comparing it to the libraries listed below
Sorting:
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Feb 17, 2026Updated last week
- ☆28Aug 6, 2020Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- This project is an open-source proof of concept implementing a Runes Mock Bridge☆10Jan 28, 2026Updated last month
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated 3 weeks ago
- Secure access cloud terraform provider☆13Feb 16, 2026Updated last week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 8 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Jan 11, 2026Updated last month
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Chapter 2 project to create a Coffee brewing scale using a Raspberry Pi and USB shipping scale.☆11Sep 18, 2015Updated 10 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- token exchange as a service☆11Updated this week
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Updated this week
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 7 months ago
- MCP server for Zoom☆20Mar 4, 2025Updated 11 months ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 weeks ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Lightweight Agent Detection & Response (ADR) layer for AI agents — guards commands, files, and web requests☆59Updated this week
- ☆14Jan 8, 2026Updated last month