SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context Protocol (MCP)](https://modelcontextprotocol.io/introduction). It proactively identifies threats like OAuth token leakage, prompt injection vulnerabilities, rogue MCP servers, and tool poisoning attacks.
☆139Jun 7, 2025Updated 10 months ago
Alternatives and similar repositories for SecureMCP
Users that are interested in SecureMCP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆125Dec 14, 2025Updated 4 months ago
- Manage / Proxy / Secure your MCP Servers☆196Aug 8, 2025Updated 8 months ago
- MCP security wrapper☆217Updated this week
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- A series of tutorials and sketches pulled from various sources and modified for the Thotcon 0xA conference badge.☆15May 3, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Zero Trust Agent☆54Mar 28, 2026Updated 2 weeks ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 3 weeks ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Aug 30, 2025Updated 7 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆160Mar 5, 2026Updated last month
- Convert your HackerOne reports into reusable AI skills.☆85Mar 9, 2026Updated last month
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Apr 3, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Mar 27, 2026Updated 2 weeks ago
- ☆23Mar 4, 2025Updated last year
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆34Nov 27, 2025Updated 4 months ago
- Open source templates you can use to bootstrap your security programs☆899Dec 28, 2025Updated 3 months ago
- HaveIBeenPwned Password Policy for Keycloak PoC☆12Jan 22, 2019Updated 7 years ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 4 months ago
- MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. In…☆606Mar 30, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 💅🏽 analyzes your github actions☆99Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Updated this week
- Google Maps for AWS IAM☆270Apr 7, 2026Updated last week
- A curated list of Awesome Security Challenges.☆211Nov 6, 2024Updated last year
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 2 weeks ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆77Updated this week
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,004Mar 2, 2026Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67May 1, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆91Mar 14, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Updated this week
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆111Dec 3, 2025Updated 4 months ago
- Real-time interface traffic viewer for curses☆24Apr 8, 2024Updated 2 years ago
- Impacket☆50Feb 25, 2026Updated last month
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 4 months ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago