dreadnode / dyana
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆311Updated this week
Alternatives and similar repositories for dyana:
Users that are interested in dyana are comparing it to the libraries listed below
- A repository of credential stealer formats☆210Updated 3 weeks ago
- ☆136Updated last month
- A very simple open source implementation of Google's Project Naptime☆132Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆66Updated 8 months ago
- A research project to add some brrrrrr to Burp☆154Updated 2 months ago
- Search engine for CTF writeups with instant results.☆131Updated last month
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆163Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆151Updated 5 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆69Updated last week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆160Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆225Updated 2 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆44Updated last week
- Halberd : Multi-Cloud Attack Platform☆266Updated this week
- Canary Detection☆167Updated last year
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆67Updated 4 months ago
- ☆35Updated 4 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆243Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆143Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated 11 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆176Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- NOVA: The Prompt Pattern Matching☆55Updated this week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 2 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆193Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆193Updated 3 months ago
- A web CTF for training developers in bug hunting and secure coding!☆98Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago