sec-netexec-mcp and sec-john-the-ripper-mcp
These are complementary tools in a penetration testing workflow: NetExec performs network reconnaissance and credential testing across systems, while John the Ripper cracks passwords offline to generate the credentials that NetExec can then deploy during exploitation.
About sec-netexec-mcp
schwarztim/sec-netexec-mcp
MCP server for NetExec - Network execution tool for penetration testing
Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.
About sec-john-the-ripper-mcp
schwarztim/sec-john-the-ripper-mcp
MCP server for John the Ripper - Password cracking and security auditing via SSH to Kali Linux
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work