Daniel-Ayz / CHeaTView external linksLinks
Cloak, Honey, Trap: Proactive Defenses Against LLM Agents
☆15Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for CHeaT
Users that are interested in CHeaT are comparing it to the libraries listed below
Sorting:
- Event Aggregation/Publishing System☆36Updated this week
- A curated list of literature and methods useful in leadership positions☆11Nov 20, 2023Updated 2 years ago
- We present MAPTA, a multi-agent system for autonomous web application security assessment that combines large language model orchestratio…☆93Aug 28, 2025Updated 5 months ago
- ☆54Updated this week
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- ☆13Mar 9, 2025Updated 11 months ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- ☆13Jul 17, 2023Updated 2 years ago
- Tor control port command line tool☆13Apr 21, 2025Updated 9 months ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- A Web-Application based service which can control/assign the bandwidth of a Virtual Network based on Mininet using RYU as the SDN Control…☆12Apr 24, 2020Updated 5 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- Mixmaster Anonymous Remailer☆18May 12, 2014Updated 11 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- [NDSS'25] "Provably Unlearnable Data Examples"☆22Dec 10, 2025Updated 2 months ago
- My OSCP cheat sheet☆21Aug 4, 2024Updated last year
- Resources for the GPS spoofing detection project☆11Apr 24, 2023Updated 2 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆17Mar 29, 2024Updated last year
- This repository contains the work done in completion of my final year project for the degree of Cyber Security BSc at the University of W…☆12May 20, 2022Updated 3 years ago
- ☆12Nov 27, 2024Updated last year
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Feb 4, 2026Updated last week
- Large-scale SDN emulator based on Mininet☆14Feb 28, 2017Updated 8 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆15Oct 24, 2025Updated 3 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆48Jan 19, 2026Updated 3 weeks ago
- Interactive, dynamic, and realistic LLM honeypots☆73Feb 18, 2025Updated 11 months ago
- Kubernetes Operator for Falco☆15Feb 6, 2026Updated last week
- Security management in SDN using Reinforcement Learning☆14Dec 8, 2022Updated 3 years ago
- A prototype for an architecture that uses Machine Learning to detect abnormalities in the SDN network packet flow, built by Ryu SDN and m…☆15Jun 25, 2023Updated 2 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago