dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆334Updated last week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆150Updated 8 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆80Updated 6 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆149Updated last week
- A repository of credential stealer formats☆233Updated 5 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- A very simple open source implementation of Google's Project Naptime☆173Updated 8 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆258Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- An archive of 0day.today exploits☆312Updated 4 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 9 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆164Updated last year
- ☆109Updated 2 weeks ago
- ☆315Updated 4 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆94Updated 4 months ago
- The most complete code auditing platform with thousands of real-world challenges☆131Updated 5 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆163Updated 6 months ago
- Canary Detection☆188Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆52Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆207Updated 2 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆105Updated 5 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆52Updated last year
- NOVA: The Prompt Pattern Matching☆53Updated last month
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆218Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆271Updated 6 months ago
- Metis is an open-source, AI-driven tool for deep security code review☆295Updated this week
- ☆337Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆61Updated 9 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated last year