cisagov / sensitive-data-scannerLinks
A tool for detecting sensitive data in code repositories
☆16Updated last month
Alternatives and similar repositories for sensitive-data-scanner
Users that are interested in sensitive-data-scanner are comparing it to the libraries listed below
Sorting:
- Automated Static Analysis Framework☆9Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- cool dockerfiles☆13Updated 9 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- ☆11Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated 2 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Updated 9 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last month
- Application scanning component of OWASP PurpleTeam☆15Updated 2 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- ☆11Updated 4 years ago
- ThreatWorx Information Gathering Script (twigs) to discover assets like hosts, cloud instances, containers and repositories of projects.☆12Updated this week
- Setting up a training environment for MISP☆12Updated 2 years ago