dreadnode / dyanaLinks
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
☆325Updated this week
Alternatives and similar repositories for dyana
Users that are interested in dyana are comparing it to the libraries listed below
Sorting:
- Search engine for CTF writeups with instant results.☆149Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆75Updated 3 months ago
- ☆146Updated 2 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆48Updated 9 months ago
- A repository of credential stealer formats☆223Updated 2 months ago
- A very simple open source implementation of Google's Project Naptime☆163Updated 4 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆199Updated 10 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- NOVA: The Prompt Pattern Matching☆154Updated 2 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated last month
- A research project to add some brrrrrr to Burp☆183Updated 6 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆231Updated 6 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated last week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆81Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆99Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 5 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆142Updated 2 months ago
- ☆290Updated 2 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 9 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆102Updated 3 weeks ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆57Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆89Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆68Updated last week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆84Updated this week
- Canary Detection☆187Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 10 months ago
- ☆47Updated 9 months ago
- An archive of 0day.today exploits☆83Updated 2 weeks ago