A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
β101Oct 15, 2025Updated 7 months ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 7 months ago
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- β36Apr 12, 2026Updated last month
- Unix Process hollowing in rustβ22Dec 16, 2024Updated last year
- Modular web-application honeypot platform built using go and ginβ63May 8, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β56Apr 26, 2026Updated 3 weeks ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.β48Sep 18, 2025Updated 8 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wiresharkβ18Jan 27, 2026Updated 3 months ago
- SAM Dumping in C#β55Nov 27, 2025Updated 5 months ago
- β35Dec 6, 2023Updated 2 years ago
- β24Mar 4, 2025Updated last year
- Dump Kerberos tickets from the KCM database of SSSDβ58Dec 31, 2025Updated 4 months ago
- β35Nov 14, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.β257Dec 18, 2025Updated 5 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.β941May 6, 2026Updated 2 weeks ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β30Nov 26, 2025Updated 5 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntinβ¦β154Apr 25, 2022Updated 4 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.β16Aug 19, 2025Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.β135Apr 17, 2025Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters β¦β315May 13, 2026Updated last week
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.β44Jun 27, 2023Updated 2 years ago
- Windows Application Attack Surface Analyzerβ25Feb 22, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- β20Aug 12, 2024Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detectionsβ54Jan 28, 2026Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β88Mar 6, 2025Updated last year
- Defender for Endpointβ28Mar 28, 2026Updated last month
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounβ¦β16Apr 26, 2020Updated 6 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.β27Jul 27, 2022Updated 3 years ago
- This repository contains various public projects created by the owners of Hybrid Brothersβ21Nov 3, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queriesβ14Sep 18, 2025Updated 8 months ago
- Mapping of open-source detection rules and atomic tests.β211Feb 16, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.β47Mar 22, 2026Updated last month
- Remote Desktop Protocol .NET Console Application for Authenticated Command Executionβ12Jan 21, 2020Updated 6 years ago
- Phishing Template Workbenchβ36Apr 14, 2026Updated last month
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.β31Jul 12, 2023Updated 2 years ago
- β72Oct 21, 2024Updated last year
- β72Oct 24, 2025Updated 6 months ago
- β71Apr 16, 2026Updated last month