A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incorporates multiple engines that operate in sequence to analyze and classify user inputs before they reach GenAI applications.
β101Oct 15, 2025Updated 6 months ago
Alternatives and similar repositories for AIDR-Bastion
Users that are interested in AIDR-Bastion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Modular web-application honeypot platform built using go and ginβ63May 8, 2024Updated last year
- Unix Process hollowing in rustβ22Dec 16, 2024Updated last year
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.β47Sep 18, 2025Updated 7 months ago
- SAM Dumping in C#β55Nov 27, 2025Updated 5 months ago
- β35Dec 6, 2023Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSDβ57Dec 31, 2025Updated 4 months ago
- β35Nov 14, 2024Updated last year
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.β253Dec 18, 2025Updated 4 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.β934Jan 15, 2026Updated 3 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 5 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntinβ¦β154Apr 25, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An index of publicly available and open-source threat detection rulesets.β133Apr 17, 2025Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters β¦β311Apr 20, 2026Updated last week
- Windows Application Attack Surface Analyzerβ24Feb 22, 2024Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β87Mar 6, 2025Updated last year
- β20Aug 12, 2024Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detectionsβ51Jan 28, 2026Updated 3 months ago
- Defender for Endpointβ28Mar 28, 2026Updated last month
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounβ¦β16Apr 26, 2020Updated 6 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.β27Jul 27, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- QRadar AQL backend for converting Sigma rules to QRadar AQL queriesβ14Sep 18, 2025Updated 7 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy forβ95Mar 17, 2026Updated last month
- Mapping of open-source detection rules and atomic tests.β208Feb 16, 2026Updated 2 months ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.β47Mar 22, 2026Updated last month
- Remote Desktop Protocol .NET Console Application for Authenticated Command Executionβ12Jan 21, 2020Updated 6 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.β31Jul 12, 2023Updated 2 years ago
- β72Oct 21, 2024Updated last year
- β72Oct 24, 2025Updated 6 months ago
- β68Apr 16, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security gateway for AI agents - credential-isolated API proxying and policy-gated remote execution (conclaves). Reduce the blast radius!β128Mar 11, 2026Updated last month
- Quick ESXi Log Parserβ31Oct 20, 2025Updated 6 months ago
- Pulsar Registry Frontend for Community Packagesβ13Feb 15, 2026Updated 2 months ago
- Augmentation to Machine Readable CTIβ38Apr 22, 2026Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detectionβ¦β730Apr 2, 2026Updated 3 weeks ago
- Menu for Thor scanner liteβ20Oct 24, 2025Updated 6 months ago
- β19Jul 14, 2025Updated 9 months ago