A PDF redaction tool that employs named entity recognition.
☆17Apr 11, 2023Updated 3 years ago
Alternatives and similar repositories for bitcurator-redact-pdf
Users that are interested in bitcurator-redact-pdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Aug 11, 2024Updated last year
- redis starter☆13Sep 13, 2017Updated 8 years ago
- Zeroconf setup for tinc (mesh vpn) using consul as coordinator backend, and compatible with kubernetes☆12Jan 19, 2017Updated 9 years ago
- browsing through the looking glass☆10Jul 10, 2023Updated 2 years ago
- Example using Grafana with Druid☆11Mar 27, 2015Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Nov 22, 2019Updated 6 years ago
- JDBC Driver for Treasure Data☆11May 1, 2024Updated last year
- A tool set to help developer to use Guava with Java 8☆11Feb 22, 2021Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Push Notification Server for the open web.☆36Sep 4, 2020Updated 5 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 6 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 4 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆29Jul 11, 2025Updated 9 months ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- Docker image for fluentd with support for both elasticsearch and kinesis☆11Dec 15, 2023Updated 2 years ago
- Corelight Sensor API command-line client☆17Jan 9, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Jul 26, 2018Updated 7 years ago
- Nmap to MongoDB☆11Mar 21, 2019Updated 7 years ago
- ☆19Jan 31, 2025Updated last year
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- Identify web application versions☆18Apr 14, 2017Updated 9 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- SharedVault is a small application that allows you to define a secret that will require multiple people to unlock.☆13Apr 29, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated 2 weeks ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- ☆17Oct 18, 2025Updated 5 months ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 7 years ago