0xAIDR / AIDR-BastionLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆94Updated 3 weeks ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆183Updated 9 months ago
- ☆116Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆47Updated 8 months ago
- An index of publicly available and open-source threat detection rulesets.☆129Updated 6 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆153Updated 2 weeks ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆137Updated 2 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆100Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated 2 weeks ago
- ☆74Updated this week
- Rules shared by the community from 100 Days of YARA 2025☆37Updated 9 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆113Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆149Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 4 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 6 months ago
- God Mode Detection Rules☆134Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆86Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 months ago
- Living Off Security Tools☆52Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆58Updated 2 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- ☆98Updated last week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆50Updated 6 months ago
- A list of RMMs designed to be used in automation to build alerts☆114Updated this week
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆56Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago