General research for Dreadnode
☆27Jun 17, 2024Updated last year
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- Minimal workflows☆20Mar 19, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- CLI and API server for https://github.com/dreadnode/robopages☆38Feb 18, 2026Updated last week
- A utility to inspect, validate, sign and verify machine learning model files.☆66Feb 5, 2025Updated last year
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆80Sep 1, 2025Updated 5 months ago
- Example agents for the Dreadnode platform☆22Dec 19, 2025Updated 2 months ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated 11 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- ☆16May 26, 2021Updated 4 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 9 months ago
- TACL 2025: Investigating Adversarial Trigger Transfer in Large Language Models☆19Aug 17, 2025Updated 6 months ago
- Blind Reverse Engineering a Wireless Protocol - or - Amateur Signals Intelligence☆22Jul 22, 2014Updated 11 years ago
- ☆24Jun 17, 2025Updated 8 months ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆16Jan 28, 2026Updated last month
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 3 years ago
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)☆48Nov 5, 2025Updated 3 months ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- A research project to add some brrrrrr to Burp☆207Feb 16, 2026Updated last week
- ☆35May 21, 2025Updated 9 months ago
- Auditing agents for fine-tuning safety☆18Oct 21, 2025Updated 4 months ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Dec 10, 2021Updated 4 years ago
- Red-Teaming Language Models with DSPy☆251Feb 13, 2025Updated last year
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- ☆10Sep 24, 2017Updated 8 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆36Oct 15, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- A lightweight and high-performance WordPress theme built exclusively for Elementor, using Vite, Tailwind CSS, and PostCSS. 🚀☆10Aug 10, 2025Updated 6 months ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆12Nov 23, 2025Updated 3 months ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Ejemplos y prácticas utilizados en el curso Aprende a programar desde cero con C# de Microsoft .NET☆13Jan 9, 2026Updated last month
- ☆10Mar 6, 2023Updated 2 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Accepted by ECCV 2024☆188Oct 15, 2024Updated last year