dreadnode / dyana
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆288Updated this week
Alternatives and similar repositories for dyana:
Users that are interested in dyana are comparing it to the libraries listed below
- A repository of credential stealer formats☆193Updated last month
- A research project to add some brrrrrr to Burp☆127Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆142Updated 3 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆59Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 5 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆151Updated 10 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆253Updated 2 months ago
- Automated vulnerability discovery and annotation☆64Updated 6 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆118Updated 3 weeks ago
- ☆124Updated 2 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆214Updated 2 weeks ago
- Canary Detection☆164Updated 10 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆43Updated 3 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆78Updated 3 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆49Updated 3 months ago
- Mapping of open-source detection rules and atomic tests.☆125Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 3 months ago
- Protection against HTML smuggling attempts.☆87Updated last week
- Python tool to check rootkits in Windows kernel☆192Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆182Updated 4 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆174Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 6 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆63Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆205Updated 2 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆61Updated 2 months ago
- Halberd : Multi-Cloud Attack Platform☆248Updated 2 weeks ago
- ☆62Updated 2 months ago
- ☆191Updated last week