dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆339Updated this week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- ☆126Updated 3 weeks ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated last week
- An archive of 0day.today exploits☆329Updated 5 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- A repository of credential stealer formats☆236Updated 6 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆96Updated 5 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆263Updated 3 months ago
- A very simple open source implementation of Google's Project Naptime☆179Updated 9 months ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Updated 11 months ago
- ☆233Updated 2 weeks ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated last month
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆334Updated 2 weeks ago
- ☆314Updated 5 months ago
- Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents,…☆961Updated this week
- source code for the offsecml framework☆46Updated last year
- A collection of methods to learn who the owner of an IP address is.☆204Updated 3 months ago
- Canary Detection☆186Updated 2 months ago
- NOVA: The Prompt Pattern Matching☆62Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 7 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆284Updated last month
- ☆292Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆274Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Lightweight LLM Interaction Framework☆400Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month