cisagov / sensitive-data-scanner
A tool for detecting sensitive data in code repositories
☆14Updated 2 months ago
Alternatives and similar repositories for sensitive-data-scanner:
Users that are interested in sensitive-data-scanner are comparing it to the libraries listed below
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Automated Static Analysis Framework☆9Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated last week
- Training scenarios for cyber ranges☆11Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated last year
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Open YARA scan- and search engine☆20Updated last month
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 4 months ago
- ☆11Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- ☆11Updated 4 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- ☆33Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- ☆15Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Maturity Model Collaborative project☆14Updated last year
- ☆21Updated last year
- Best practices in threat intelligence☆46Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 8 months ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- A Darktrace CLI written in Python☆15Updated 5 years ago