☆20Apr 10, 2025Updated last year
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆52Jun 21, 2025Updated 9 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 2 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆22Oct 8, 2025Updated 6 months ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- ☆18Mar 28, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Mar 28, 2025Updated last year
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- PII detection platform, leveraging human-in-the-loop AI☆53Nov 29, 2024Updated last year
- ☆27Dec 2, 2025Updated 4 months ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆19Aug 26, 2021Updated 4 years ago
- MCP Armor continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden risks in…☆113Mar 27, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Free open-source information gathering☆12Mar 20, 2023Updated 3 years ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆66Feb 22, 2025Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- This repository is all about tips on ethical hacking and penetration testing!☆76Feb 22, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AI Bill of Materials through source code scanning☆55Updated this week
- A modern, responsive web app for managing comic book collections with analytics, financial tracking, and mobile-friendly browsing. Self-h…☆29Mar 24, 2026Updated 3 weeks ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- ☆16May 15, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- AWS Modernization DevSecOps Code Samples☆13Nov 30, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago