ThalesGroup / sql-data-guardLinks
Safety Layer for LLM Database Interactions
☆47Updated last month
Alternatives and similar repositories for sql-data-guard
Users that are interested in sql-data-guard are comparing it to the libraries listed below
Sorting:
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Updated 4 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆169Updated last week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated 5 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated 2 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated last month
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 10 months ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Updated 2 months ago
- Red Team tools containerized☆74Updated 2 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆27Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Burpsuite Extension for Jsmon☆20Updated 3 weeks ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆56Updated last week
- ☆20Updated 9 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Updated 4 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Updated last year
- ☆186Updated 2 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 9 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆229Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- SOAPI - The OpenAPI Documentation Scanner☆39Updated 11 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- ☆12Updated 10 months ago
- Yet another machine learning-based WAF research☆26Updated 3 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Updated 2 weeks ago
- ☆59Updated last month
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Updated 3 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Updated last year