A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
β100Oct 15, 2025Updated 5 months ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behaviorβ53Feb 16, 2026Updated last month
- Modular web-application honeypot platform built using go and ginβ63May 8, 2024Updated last year
- Unix Process hollowing in rustβ22Dec 16, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wiresharkβ18Jan 27, 2026Updated 2 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.β47Sep 18, 2025Updated 6 months ago
- SAM Dumping in C#β56Nov 27, 2025Updated 4 months ago
- β35Dec 6, 2023Updated 2 years ago
- β23Mar 4, 2025Updated last year
- Dump Kerberos tickets from the KCM database of SSSDβ56Dec 31, 2025Updated 3 months ago
- β35Nov 14, 2024Updated last year
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.β248Dec 18, 2025Updated 3 months ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.β919Jan 15, 2026Updated 2 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters β¦β306Mar 19, 2026Updated 3 weeks ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.β44Jun 27, 2023Updated 2 years ago
- Windows Application Attack Surface Analyzerβ24Feb 22, 2024Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β87Mar 6, 2025Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detectionsβ47Jan 28, 2026Updated 2 months ago
- Defender for Endpointβ28Mar 28, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounβ¦β16Apr 26, 2020Updated 5 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.β27Jul 27, 2022Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.β204Feb 16, 2026Updated last month
- This repo contains useful scripts that AI created for me which I would have been too lazy forβ95Mar 17, 2026Updated 3 weeks ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Executionβ12Jan 21, 2020Updated 6 years ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.β47Mar 22, 2026Updated 2 weeks ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.β31Jul 12, 2023Updated 2 years ago
- β72Oct 24, 2025Updated 5 months ago
- β72Oct 21, 2024Updated last year
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- β65Mar 31, 2026Updated last week
- Automating the MITM attack on WSUSβ326Updated this week
- Pulsar Registry Frontend for Community Packagesβ13Feb 15, 2026Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detectionβ¦β728Apr 2, 2026Updated last week
- Menu for Thor scanner liteβ20Oct 24, 2025Updated 5 months ago
- Augmentation to Machine Readable CTIβ38Sep 9, 2025Updated 7 months ago
- β19Jul 14, 2025Updated 8 months ago