A tool for detecting sensitive data in code repositories
☆18Apr 27, 2026Updated this week
Alternatives and similar repositories for sensitive-data-scanner
Users that are interested in sensitive-data-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆85Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆36Updated this week
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Apr 9, 2025Updated last year
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- ☆18Dec 20, 2024Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- setup zeek, previously Bro IDS☆18Apr 21, 2026Updated last week
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- ☆10Oct 15, 2023Updated 2 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆14Updated this week
- ☆11Dec 31, 2018Updated 7 years ago
- IBM QRadar Ansible Collection☆25Mar 16, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 5 months ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆17Apr 26, 2026Updated last week
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Jul 10, 2023Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Zeek package to create JSON formatted logs to stream into data analysis systems.☆31Dec 3, 2025Updated 4 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- Simple and Powerfull Utility for Docker☆27Dec 22, 2021Updated 4 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- ☆21Oct 17, 2021Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated last year
- The current website at https://disclose.io.☆19Apr 22, 2026Updated last week
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- An easy-to-use automatic performance diagnosis and optimization tool for HPC applications☆35Jan 25, 2018Updated 8 years ago
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 4 months ago
- Digital Forensics for Pentesters - Hands-on Learning, by EC-Council☆22Dec 15, 2025Updated 4 months ago
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆24Oct 5, 2015Updated 10 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- How to integrate PeerJs into node-webkit/NW.js app☆11Jun 16, 2015Updated 10 years ago
- ☆10Apr 3, 2023Updated 3 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 4 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆53Nov 15, 2023Updated 2 years ago