tjnull / Ludus-FastMCPLinks
Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** across 15 modules for range lifecycle management, scenario deployment, template creation, Ansible role management, and security monitoring integration.
☆44Updated last week
Alternatives and similar repositories for Ludus-FastMCP
Users that are interested in Ludus-FastMCP are comparing it to the libraries listed below
Sorting:
- ☆52Updated 2 weeks ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆245Updated 2 weeks ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆44Updated 2 weeks ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 4 months ago
- AI-based implant feature☆25Updated 8 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆82Updated last month
- Execute shellcode via ASPNET compiler☆59Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- Minimal workflows☆20Updated last year
- A Payload Analysis Framework☆112Updated 2 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆122Updated last week
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated this week
- ☆55Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆67Updated 2 months ago
- Malware traffic obfuscation library☆40Updated 5 months ago
- ☆186Updated last month
- Persist like a Dodder☆66Updated 7 months ago
- ☆95Updated 4 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Updated 2 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆155Updated 2 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆47Updated 5 months ago
- Adversary Simulation Framework☆38Updated 4 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Updated 2 months ago
- ☆18Updated last year