sec-netexec-mcp and sec-john-the-ripper-mcp

These are complementary tools in a penetration testing workflow: NetExec performs network reconnaissance and credential testing across systems, while John the Ripper cracks passwords offline to generate the credentials that NetExec can then deploy during exploitation.

sec-netexec-mcp
35
Emerging
sec-john-the-ripper-mcp
21
Experimental
Maintenance 10/25
Adoption 2/25
Maturity 11/25
Community 12/25
Maintenance 10/25
Adoption 0/25
Maturity 11/25
Community 0/25
Stars: 2
Forks: 1
Downloads:
Commits (30d): 0
Language: JavaScript
License: MIT
Stars:
Forks:
Downloads:
Commits (30d): 0
Language: JavaScript
License: MIT
No Package No Dependents
No Package No Dependents

About sec-netexec-mcp

schwarztim/sec-netexec-mcp

MCP server for NetExec - Network execution tool for penetration testing

Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.

About sec-john-the-ripper-mcp

schwarztim/sec-john-the-ripper-mcp

MCP server for John the Ripper - Password cracking and security auditing via SSH to Kali Linux

Scores updated daily from GitHub, PyPI, and npm data. How scores work