sec-netexec-mcp and sec-powershell-empire-mcp

Both are ecosystem siblings, specifically MCP servers, with `sec-netexec-mcp` serving NetExec and `sec-powershell-empire-mcp` serving PowerShell Empire, indicating they are different server implementations for distinct penetration testing tools within the same "penetration-testing-mcp" ecosystem.

sec-netexec-mcp
35
Emerging
sec-powershell-empire-mcp
21
Experimental
Maintenance 10/25
Adoption 2/25
Maturity 11/25
Community 12/25
Maintenance 10/25
Adoption 0/25
Maturity 11/25
Community 0/25
Stars: 2
Forks: 1
Downloads:
Commits (30d): 0
Language: JavaScript
License: MIT
Stars:
Forks:
Downloads:
Commits (30d): 0
Language: JavaScript
License: MIT
No Package No Dependents
No Package No Dependents

About sec-netexec-mcp

schwarztim/sec-netexec-mcp

MCP server for NetExec - Network execution tool for penetration testing

Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.

About sec-powershell-empire-mcp

schwarztim/sec-powershell-empire-mcp

MCP server for PowerShell Empire - Post-exploitation framework

Scores updated daily from GitHub, PyPI, and npm data. How scores work