mrwadams / otx-mcpLinks
☆20Updated 9 months ago
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below
Sorting:
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 7 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- MCP to help Defenders Detection Engineer Harder and Smarter☆63Updated this week
- ☆76Updated last year
- ☆58Updated last month
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- ☆24Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 5 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 10 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- ☆82Updated 4 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- ☆31Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 10 months ago
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- ☆84Updated 2 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆64Updated last week
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 7 months ago
- ☆56Updated 11 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Living Off Security Tools☆58Updated last month
- Script to test NetSec capabilities.☆21Updated 2 years ago