mrwadams / otx-mcpLinks
☆18Updated 7 months ago
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below
Sorting:
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 4 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆35Updated 3 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 5 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- ☆22Updated 2 years ago
- ☆79Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- IP address filter by City☆12Updated 10 months ago
- A not-curated list of cloud hacking labs☆27Updated last year
- Autonomous AI C2☆32Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 8 months ago
- ☆81Updated this week
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- ☆31Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Updated 4 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆48Updated 8 months ago
- Living Off Security Tools☆52Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 9 months ago
- Create honeypots for cloud environments☆103Updated last month
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 4 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 9 months ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year