dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆318Updated this week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- A repository of credential stealer formats☆217Updated 2 months ago
- Search engine for CTF writeups with instant results.☆142Updated 2 months ago
- A research project to add some brrrrrr to Burp☆173Updated 3 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆71Updated last month
- NOVA: The Prompt Pattern Matching☆111Updated last month
- Canary Detection☆168Updated 2 weeks ago
- A very simple open source implementation of Google's Project Naptime☆150Updated 2 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆156Updated 6 months ago
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 8 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆235Updated last month
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆68Updated last week
- ☆147Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆249Updated 2 weeks ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆190Updated 8 months ago
- A collection of methods to learn who the owner of an IP address is.☆158Updated last week
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆88Updated this week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆202Updated this week
- ☆141Updated 3 months ago
- local language model for radare2☆278Updated last week
- An index of publicly available and open-source threat detection rulesets.☆112Updated last month
- ☆67Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆52Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 5 months ago
- ☆99Updated last month
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆185Updated 9 months ago
- Halberd : Multi-Cloud Attack Tool☆278Updated 3 weeks ago