0xAIDR / AIDR-BastionLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆87Updated last week
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆177Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 7 months ago
- ☆74Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated this week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 5 months ago
- ☆116Updated 4 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆85Updated 5 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆151Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆99Updated 8 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 7 months ago
- ☆97Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 4 months ago
- Slides of my public talks☆56Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆36Updated 8 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆49Updated 6 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆120Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆111Updated 11 months ago
- God Mode Detection Rules☆134Updated last year
- A home for detection content developed by the delivr.to team☆71Updated 2 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆28Updated 11 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated 2 months ago
- Living Off Security Tools☆52Updated 11 months ago
- A list of RMMs designed to be used in automation to build alerts☆113Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆54Updated 2 months ago