ThalesGroup / sql-data-guardLinks
Safety Layer for LLM Database Interactions
☆47Updated last month
Alternatives and similar repositories for sql-data-guard
Users that are interested in sql-data-guard are comparing it to the libraries listed below
Sorting:
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Updated 4 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆27Updated 5 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆169Updated last week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Updated 2 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated last month
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆19Updated 10 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- ☆17Updated 2 years ago
- ☆12Updated 10 months ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆56Updated last week
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- A YARA rule generator☆60Updated 3 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 10 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated 5 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆17Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 9 months ago
- ☆186Updated 2 months ago
- ☆71Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- ☆20Updated 9 months ago
- A new era for SOCs begins☆24Updated 8 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆183Updated 3 weeks ago