Open-Source • Zero-Trust • Built for Real-World Defense
AI-powered phishing URL & email analyzer with IOC extraction and risk scoring.
View on GitHub →Detects leaked API keys, tokens, and credentials in codebases & repos.
View on GitHub →Correlates alerts, scores campaigns, and auto-generates response playbooks.
View on GitHub →Audits ZTNA policies across Cloudflare, Zscaler, Prisma & more.
View on GitHub →Detects VVS-style Discord stealers, fake Nitro scams & token grabs.
View on GitHub →Ethical red-team tool to test EDR evasion via polymorphism.
View on GitHub →Checks emails & domains against known breach exposure with playbooks.
View on GitHub →Fast Solidity vulnerability scanner for Web3 & DeFi projects.
View on GitHub →Analyzes phishing kits, extracts IOCs & generates takedown playbooks.
View on GitHub →High-interaction deception honeypot capturing attacker TTPs safely.
View on GitHub →Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks. Follow on LinkedIn Apps & Security Tools © 2026 CyberDudeBivash Pvt. Ltd. | Global Cybersecurity Authority Visit https://www.cyberdudebivash.com for tools, reports & services Explore our blogs https://cyberbivash.blogspot.com https://cyberdudebivash-news.blogspot.com & https://cryptobivash.code.blog to know more in Cybersecurity , AI & other Tech Stuffs. The CYBERDUDEBIVASH ECOSYSTEM is thrilled to announce the immediate public release of our newest high-impact cybersecurity tool: the CYBERDUDEBIVASH AI Behavioral Triage Scanner — also known as the LITL/IPI Detector.This ethical, local-only forensic auditing tool is purpose-built to detect Lies-in-the-Loop (LITL) deception attacks — one of the most stealthy and dangerous AI threat vectors emerging in 2026. Adversaries exploit human-in-the-loop (HITL) interactions with AI agents (coding assistants, SOC copilots, autonomous workflows, etc.) by injecting hidden siphon commands, visual padding evasion, Markdown forgery, indirect prompt injection (IPI) artifacts, unverified tool calls, and trust-liquidation techniques that bypass guardrails and lead to code execution, credential theft, or supply-chain compromise.The scanner automates trace auditing at scale — claimed 100× faster than manual review — turning untrusted AI dialogs into searchable forensic evidence. It is the sovereign primitive powering the defensive phase of CYBERDUDEBIVASH’s 2026 Kill Chain for AI deception hunting.
git clone https://github.com/cyberdudebivash/CYBERDUDEBIVASH-AI-LITL-Triage-Scanner.git
cd CYBERDUDEBIVASH-AI-LITL-Triage-Scannerpython triage_scanner.py path/to/your_agent_trace.jsonpython triage_scanner.py logs/ --dirExample Output (from a test with hidden siphon + padding):text
CYBERDUDEBIVASH AI Behavioral Triage Report
Copyright © 2026 CYBERDUDEBIVASH ECOSYSTEM – Authorized Forensic Tool
Generated: 2026-01-16 02:20:54 IST
File Analyzed: logs/malicious_trace.json
Total Alerts: 3
DETECTION SUMMARY:
- [ALERT] Siphon pattern matched: '(?i)ignore\s+all' in entry 0
- [ALERT] Visual padding evasion detected (72 newlines) in entry 0
- [WARNING] Unverified tool call in entry 0: rm -rf /
RECOMMENDATIONS:
- Treat as potential LITL / IPI incident
- Isolate the affected AI agent immediately
- Perform full context audit
- Contact CYBERDUDEBIVASH for forensic support: https://www.cyberdudebivash.com/contact
HIGH-RISK FINDINGS – Recommend immediate triage.
For enterprise remediation, custom rules, or trainings: https://www.cyberdudebivash.com/contact
Join Affiliates Program: https://www.cyberdudebivash.com/affiliatesThis release is our statement: AI deception will not go undetected. We are building the tools, frameworks, and authority to hunt LITL threats at scale.Thank you for the support. Let's make 2026 the year we reclaim trust in AI agents.Bivash KumarFounder & Lead Authority CYBERDUDEBIVASH ECOSYSTEM Mysuru, Karnatakawww.cyberdudebivash.com#Cybersecurity #AIsecurity #LITL #PromptInjection #AIAgentAuditing #DeceptionHunting #ZeroTrustAI #2026Threats #CyberDudeBivash
Subscribe to receive research-driven threat intelligence, zero-day analysis, and cloud security insights from CyberDudeBivash. Email us at iambivash@cyberdudebivash.com.
Join the CyberDudeBivash Community →Independent Cybersecurity Research, Threat Intelligence & Defense Engineering Ecosystem
CyberDudeBivash is a research-driven cybersecurity platform focused on real-world threats — malware, ransomware, cloud attacks, supply-chain risks, and advanced adversary tradecraft.
A suite of internally developed, security-reviewed applications designed for SOC teams, defenders, DFIR analysts, and threat intelligence professionals.
CyberDudeBivash exists to independently detect, analyze, and counter advanced cyber threats — from malware and ransomware to cloud and supply-chain attacks — empowering defenders with research-driven intelligence, tools, and real-world security engineering.