0xAIDR / AIDR-BastionLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆95Updated 3 months ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago
- ☆74Updated 2 weeks ago
- MCP to help Defenders Detection Engineer Harder and Smarter☆199Updated this week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- ☆120Updated 8 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆165Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆194Updated 2 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 9 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆108Updated last week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆104Updated 11 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- ☆101Updated last month
- A preconfigured Velociraptor triage collector☆73Updated 3 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆34Updated 10 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆141Updated 2 months ago
- Your Browser-based EVTX Companion☆112Updated this week
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated last year
- CarbonBlack EDR detection rules and response actions☆73Updated last year