A tool for detecting sensitive data in code repositories
☆18Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for sensitive-data-scanner
Users that are interested in sensitive-data-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆83Dec 30, 2025Updated 2 months ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Jun 5, 2024Updated last year
- Scripts to aid in diagnosing and repairing unhealthy Windows Falcon Sensor installations☆28Aug 16, 2024Updated last year
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Apr 9, 2025Updated 11 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- ☆18Dec 20, 2024Updated last year
- ELK roles & profiles with Puppet☆14Feb 28, 2020Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- setup zeek, previously Bro IDS☆18Feb 5, 2026Updated last month
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- IBM QRadar Ansible Collection☆25Mar 16, 2026Updated last week
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 3 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Jun 11, 2024Updated last year
- Zeek package to create JSON formatted logs to stream into data analysis systems.☆30Dec 3, 2025Updated 3 months ago
- 基于污点分析的JSP Webshell检测工具,模拟JVM的栈帧操作进行数据流分析,可以检测出各种变形的JSP Webshell☆21Dec 6, 2021Updated 4 years ago
- DBOS file system using Voltdb☆19Apr 21, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- WeCTF 2020 Source Code & Organizer's Writeup☆31Feb 5, 2021Updated 5 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Digital Forensics for Pentesters - Hands-on Learning, by EC-Council☆22Dec 15, 2025Updated 3 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated 2 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago