mrwadams / otx-mcpLinks
☆18Updated 8 months ago
Alternatives and similar repositories for otx-mcp
Users that are interested in otx-mcp are comparing it to the libraries listed below
Sorting:
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆47Updated 5 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 5 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆36Updated 4 months ago
- ☆82Updated 3 weeks ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 9 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆80Updated 3 months ago
- ☆23Updated 2 years ago
- ☆78Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated last month
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 4 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆48Updated 9 months ago
- ☆31Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 8 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆16Updated 11 months ago
- Living Off Security Tools☆57Updated 2 weeks ago
- IP address filter by City☆12Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 10 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Autonomous AI C2☆32Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 9 months ago