A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits
☆34Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for vulnerablemcp
Users that are interested in vulnerablemcp are comparing it to the libraries listed below
Sorting:
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- ☆25Jun 27, 2024Updated last year
- Everything Application Security☆27Feb 18, 2026Updated 2 weeks ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- MLOps Attack Toolkit☆30Aug 25, 2025Updated 6 months ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆26Nov 23, 2017Updated 8 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- ☆25Mar 28, 2018Updated 7 years ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- ☆13Dec 12, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Maltego Transforms to Query Traffic Records☆34Oct 13, 2015Updated 10 years ago
- This repository is an open-source showcase of A2A-based AI agents that implement HTTP Message Signatures for authenticating their request…☆36Sep 25, 2025Updated 5 months ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- [DEPRECATED] You should use web3.py instead.☆10Nov 24, 2016Updated 9 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ☆14Mar 8, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Rate limiting for Ash actions.☆17Updated this week
- A framework for TinTin++ using tmux☆12Jul 10, 2016Updated 9 years ago
- Script for easy fetch ndk and sdk to compile apk with vab☆12Apr 30, 2024Updated last year