trailofbits / datasigLinks
Dataset fingerprinting for AIBOM
☆15Updated 3 weeks ago
Alternatives and similar repositories for datasig
Users that are interested in datasig are comparing it to the libraries listed below
Sorting:
- A library for intercepting system calls☆102Updated 8 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆120Updated 3 weeks ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆88Updated last month
- Code Pathfinder, the open-source alternative to GitHub CodeQL built with GoLang. Built for advanced structural search, derive insights, f…☆67Updated last week
- io_uring based rootkit☆235Updated 5 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 4 months ago
- Use LLMs for document ranking☆148Updated 5 months ago
- A web fuzzer using the httpipe format☆101Updated last year
- ☆84Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated last month
- An OpenAI API Compatible Honeypot Gateway☆16Updated 6 months ago
- Damn Vulnerable UEFI☆286Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- Multi-agent system (MAS) hijacking demos☆34Updated last month
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆108Updated 8 months ago
- Trail of Bits Testing Handbook☆79Updated last month
- ☆73Updated last week
- eBPF Memory Dump Tool☆86Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Updated 5 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆51Updated 11 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆51Updated 10 months ago
- Simple syscall sandboxing for Linux☆140Updated last month
- Open Source eBPF Malware Analysis Framework☆51Updated 11 months ago
- Publications from the eBPF foundation☆28Updated last month
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 4 months ago
- Make your programs stealthier🐝☆187Updated 3 months ago
- Userland exec PoC to be used as attack vector technique☆87Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated 2 weeks ago