dreadnode / dyana
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆306Updated this week
Alternatives and similar repositories for dyana:
Users that are interested in dyana are comparing it to the libraries listed below
- Search engine for CTF writeups with instant results.☆128Updated 3 weeks ago
- A research project to add some brrrrrr to Burp☆147Updated last month
- A repository of credential stealer formats☆202Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆67Updated last month
- Automated vulnerability discovery and annotation☆65Updated 8 months ago
- A very simple open source implementation of Google's Project Naptime☆123Updated 3 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆221Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- Canary Detection☆164Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 6 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆158Updated 11 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated 2 weeks ago
- ☆64Updated 3 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 4 months ago
- ☆126Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 2 weeks ago
- eBPF Memory Dump Tool☆62Updated 2 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆180Updated 6 months ago
- Retired TrustedSec Capabilities☆246Updated 4 months ago
- Halberd : Multi-Cloud Attack Platform☆251Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆139Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆275Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆216Updated 4 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆185Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆235Updated last week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆590Updated 3 weeks ago