0xAIDR / AIDR-BastionLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆38Updated last week
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆177Updated 8 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆46Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 11 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆45Updated 3 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆98Updated 7 months ago
- ☆74Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆49Updated 5 months ago
- Slides of my public talks☆56Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆95Updated last week
- ☆116Updated 4 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆149Updated 2 weeks ago
- ☆96Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- CarbonBlack EDR detection rules and response actions☆72Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆107Updated 11 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 6 months ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- A home for detection content developed by the delivr.to team☆70Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 8 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Living off the False Positive!☆40Updated 8 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 3 months ago
- Quick ESXi Log Parser☆26Updated 3 weeks ago