0xAIDR / AIDR-BastionLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆95Updated last month
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆187Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 6 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆48Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 2 weeks ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆100Updated 9 months ago
- Rules shared by the community from 100 Days of YARA 2025☆37Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- ☆117Updated 6 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆50Updated 7 months ago
- ☆74Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆60Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆160Updated last month
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 9 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆95Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 7 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆182Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- Slides of my public talks☆56Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆88Updated 3 weeks ago
- Turn any blog into structured threat intelligence.☆40Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- ☆99Updated last month
- ☆27Updated 2 years ago