mgreen27 / mcp-velociraptor
VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.
☆13Updated last week
Alternatives and similar repositories for mcp-velociraptor:
Users that are interested in mcp-velociraptor are comparing it to the libraries listed below
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 6 months ago
- Quick ESXi Log Parser☆19Updated 3 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated last month
- ☆41Updated last week
- ☆21Updated 2 years ago
- A preconfigured Velociraptor triage collector☆51Updated last week
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated last week
- Slides of my public talks☆55Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Contains compiled binaries of Volatility☆33Updated 3 months ago
- ShellSweeping the evil.☆52Updated 10 months ago
- Remote access and Antivirus Logging Database☆42Updated 11 months ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- My Notes from Hugging Face AI Agents Course☆13Updated 2 months ago
- A tool for fetching DFIR and other GitHub tools.☆23Updated 2 weeks ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- ☆21Updated 2 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- The home of the SDDLMaker☆14Updated 3 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- ☆19Updated 2 years ago
- The core backend server handling API requests and task management☆38Updated last week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated last week
- ☆11Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆14Updated this week