ThalesGroup / sql-data-guardLinks
Safety Layer for LLM Database Interactions
☆45Updated last month
Alternatives and similar repositories for sql-data-guard
Users that are interested in sql-data-guard are comparing it to the libraries listed below
Sorting:
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Updated 2 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆18Updated 9 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆122Updated last week
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆24Updated 4 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆29Updated 3 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆30Updated 7 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 8 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆15Updated last year
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated this week
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆23Updated last month
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆102Updated 3 weeks ago
- Short list of indirect prompt injection attacks for OpenAI-based models.☆35Updated 4 months ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Updated 11 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆236Updated this week
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 8 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Updated 8 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆39Updated 4 months ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 3 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- This is an AD pentest tools collection☆59Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Updated 3 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆173Updated last month
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆210Updated 2 weeks ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 10 months ago
- ☆17Updated 2 years ago