dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆322Updated last week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆144Updated 3 months ago
- A research project to add some brrrrrr to Burp☆178Updated 4 months ago
- A repository of credential stealer formats☆218Updated 2 weeks ago
- ☆143Updated 3 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆120Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- NOVA: The Prompt Pattern Matching☆123Updated last month
- A curated list of tools officially presented at Black Hat events☆224Updated 2 weeks ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆192Updated 8 months ago
- A very simple open source implementation of Google's Project Naptime☆155Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆239Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆73Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆235Updated 2 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆229Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Canary Detection☆182Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆251Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆168Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 5 months ago
- A collection of methods to learn who the owner of an IP address is.☆160Updated 2 weeks ago
- ☆149Updated 2 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆69Updated last month
- Deep Linux runtime visibility meets Wireshark☆291Updated last week
- The Arcanum Prompt Injection Taxonomy☆104Updated last month
- ☆246Updated last week