A tool for detecting sensitive data in code repositories
☆18Mar 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for sensitive-data-scanner
Users that are interested in sensitive-data-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search a filesystem for indicators of compromise (IoC).☆84Dec 30, 2025Updated 3 months ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆36Updated this week
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Apr 9, 2025Updated last year
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- ☆10Oct 15, 2023Updated 2 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆14Updated this week
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- IBM QRadar Ansible Collection☆25Mar 16, 2026Updated 3 weeks ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 2 months ago
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 4 months ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Jul 10, 2023Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Treck Network Stack Discovery Tool by JSOF☆34Jun 30, 2020Updated 5 years ago
- DBOS file system using Voltdb☆19Apr 21, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- Simple and Powerfull Utility for Docker☆27Dec 22, 2021Updated 4 years ago
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- The current website at https://disclose.io.☆19Apr 4, 2026Updated last week
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- Digital Forensics for Pentesters - Hands-on Learning, by EC-Council☆22Dec 15, 2025Updated 3 months ago
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Mobile Incident Response Book☆61Jun 7, 2016Updated 9 years ago
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆24Oct 5, 2015Updated 10 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago