Cloak, Honey, Trap: Proactive Defenses Against LLM Agents
☆16Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for CHeaT
Users that are interested in CHeaT are comparing it to the libraries listed below
Sorting:
- Interactive, dynamic, and realistic LLM honeypots☆73Feb 18, 2025Updated last year
- Event Aggregation/Publishing System☆36Updated this week
- A curated list of literature and methods useful in leadership positions☆11Nov 20, 2023Updated 2 years ago
- We present MAPTA, a multi-agent system for autonomous web application security assessment that combines large language model orchestratio…☆96Aug 28, 2025Updated 6 months ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- ☆55Updated this week
- ☆13Jul 17, 2023Updated 2 years ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago
- Tor control port command line tool☆13Apr 21, 2025Updated 10 months ago
- ☆14Mar 9, 2025Updated 11 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 5 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- Mixmaster Anonymous Remailer☆18May 12, 2014Updated 11 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- ☆12Nov 27, 2024Updated last year
- [NDSS'25] "Provably Unlearnable Data Examples"☆22Dec 10, 2025Updated 2 months ago
- This repository contains the work done in completion of my final year project for the degree of Cyber Security BSc at the University of W…☆12May 20, 2022Updated 3 years ago
- A Web-Application based service which can control/assign the bandwidth of a Virtual Network based on Mininet using RYU as the SDN Control…☆12Apr 24, 2020Updated 5 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆18Mar 29, 2024Updated last year
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆15Oct 24, 2025Updated 4 months ago
- Large-scale SDN emulator based on Mininet☆14Feb 28, 2017Updated 9 years ago
- Resources for the GPS spoofing detection project☆11Apr 24, 2023Updated 2 years ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Feb 27, 2026Updated last week
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- Kubernetes Operator for Falco☆15Feb 26, 2026Updated last week
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated last year
- ☆28Sep 11, 2025Updated 5 months ago