sec-netexec-mcp and sec-powershell-empire-mcp
Both are ecosystem siblings, specifically MCP servers, with `sec-netexec-mcp` serving NetExec and `sec-powershell-empire-mcp` serving PowerShell Empire, indicating they are different server implementations for distinct penetration testing tools within the same "penetration-testing-mcp" ecosystem.
About sec-netexec-mcp
schwarztim/sec-netexec-mcp
MCP server for NetExec - Network execution tool for penetration testing
Exposes NetExec's multi-protocol capabilities (SMB, WinRM, SSH, LDAP, MSSQL, RDP, WMI) to AI assistants via the Model Context Protocol, enabling automated reconnaissance, credential attacks, and post-exploitation across Windows/Linux networks. Communicates with NetExec via SSH to a remote Kali Linux instance, providing specialized tools for common pentesting workflows including pass-the-hash, password spraying, BloodHound collection, and NTDS dumping.
About sec-powershell-empire-mcp
schwarztim/sec-powershell-empire-mcp
MCP server for PowerShell Empire - Post-exploitation framework
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work