0xAIDR / AIDR-BastionView external linksLinks
A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
☆94Oct 15, 2025Updated 4 months ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below
Sorting:
- SAM Dumping in C#☆54Nov 27, 2025Updated 2 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆55Dec 31, 2025Updated last month
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accoun…☆16Apr 26, 2020Updated 5 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- ☆35Nov 14, 2024Updated last year
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 5 months ago
- ☆35Dec 6, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 4 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 weeks ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 weeks ago
- ☆73Oct 21, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Bring runZero Exposure Management into BloodHound☆44Nov 19, 2025Updated 2 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- Mapping of open-source detection rules and atomic tests.☆195Updated this week
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 4 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆883Jan 15, 2026Updated last month
- Open Threat Hunting Framework☆124May 26, 2023Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Jun 22, 2021Updated 4 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆301Updated this week
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- Silver SAML forgery tool☆56Feb 26, 2024Updated last year
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 3 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆82Updated this week
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Simulating Adversary Operations☆97Apr 13, 2018Updated 7 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Fast context enumeration for newly obtained Active Directory credentials.☆85Aug 26, 2025Updated 5 months ago