sec-netexec-mcp and sec-smbmap-mcp
These tools are **ecosystem siblings**: they are both MCP (Managed Custom Program) server implementations, likely sharing a common underlying framework or architecture (implied by the `schwarztim/` prefix and `-mcp` suffix), but each serving a different, specialized penetration testing function (network execution for A, SMB share enumeration for B).
About sec-netexec-mcp
schwarztim/sec-netexec-mcp
MCP server for NetExec - Network execution tool for penetration testing
Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.
About sec-smbmap-mcp
schwarztim/sec-smbmap-mcp
MCP server for smbmap - SMB share enumeration
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work