dreadnode / example-agentsLinks
Example agents for the Dreadnode platform
☆22Updated last month
Alternatives and similar repositories for example-agents
Users that are interested in example-agents are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- Minimal workflows☆20Updated last year
- MLOps Attack Toolkit☆29Updated 5 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- Backend development stack for agents☆29Updated 6 months ago
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- using ML models for red teaming☆45Updated 2 years ago
- ☆82Updated last month
- source code for the offsecml framework☆44Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- ☆17Updated 2 years ago
- Arxiv + Notion Sync☆20Updated 8 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 5 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- Central repo for talks and presentations☆47Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆83Updated 9 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Machine learning enabled dropper☆27Updated 2 years ago
- Nemesis agent for Mythic☆28Updated last month
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- Leverages B64 chunks to split files and save to clipboard☆26Updated last month
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 11 months ago
- Dont Gamble with Risk☆14Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Updated last year
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆44Updated this week
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Updated 10 months ago
- A simple POC to expose Mythic as a MCP server☆73Updated 10 months ago