dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆331Updated last week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆149Updated 6 months ago
- An archive of 0day.today exploits☆170Updated 2 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- A repository of credential stealer formats☆227Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆175Updated last month
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago
- The most complete code auditing platform with thousands of real-world challenges☆128Updated 3 months ago
- A very simple open source implementation of Google's Project Naptime☆169Updated 5 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- A research project to add some brrrrrr to Burp☆190Updated 7 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated 11 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆251Updated this week
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 10 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆51Updated 10 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- ☆309Updated this week
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 3 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated last week
- Canary Detection☆187Updated 4 months ago
- A collection of methods to learn who the owner of an IP address is.☆174Updated 3 months ago
- ☆314Updated 2 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆122Updated 2 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆91Updated last month
- A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.☆355Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 3 weeks ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 8 months ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago