dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆342Updated this week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆83Updated 8 months ago
- ☆134Updated last week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- Automated vulnerability discovery and annotation☆68Updated last year
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆192Updated this week
- A very simple open source implementation of Google's Project Naptime☆183Updated 10 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 4 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- An archive of 0day.today exploits☆332Updated 6 months ago
- NOVA: The Prompt Pattern Matching☆71Updated 3 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆337Updated last week
- A research project to add some brrrrrr to Burp☆197Updated 11 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 11 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- A repository of credential stealer formats☆239Updated 7 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆57Updated last year
- The most complete code auditing platform with thousands of real-world challenges