sec-netexec-mcp and sec-seclists-mcp
NetExec is a network execution tool that performs active reconnaissance and exploitation, while SecLists provides the passive wordlists and payloads that NetExec uses during its operations—making them complements that work together in penetration testing workflows.
About sec-netexec-mcp
schwarztim/sec-netexec-mcp
MCP server for NetExec - Network execution tool for penetration testing
Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.
About sec-seclists-mcp
schwarztim/sec-seclists-mcp
MCP server for SecLists - Security wordlists
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work