kiprotect / kodex
A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and personal data: Privacy and security as code.
☆118Updated 7 months ago
Alternatives and similar repositories for kodex:
Users that are interested in kodex are comparing it to the libraries listed below
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆165Updated 9 months ago
- A GDPR Data Protection Impact Assessment (DPIA) tool to assist organisations to evaluate data protection risks with respect to the EU's G…☆46Updated 2 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆205Updated 5 months ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 2 months ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆176Updated last year
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆32Updated 2 weeks ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆162Updated this week
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆49Updated last week
- Dependency Combobulator☆93Updated last year
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆25Updated 2 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆157Updated 7 months ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆179Updated 3 weeks ago
- Hfinger - fingerprinting HTTP requests☆135Updated last year
- Sensitive Data Discovery tool☆32Updated 6 years ago
- Sharing software supply chain security open source projects☆46Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Static Token And Credential Scanner☆96Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆91Updated this week
- ☆42Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆112Updated 3 weeks ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆247Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆77Updated 5 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ☆19Updated 4 years ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆89Updated 2 months ago
- simple YARA-based IOC scanner☆169Updated last month
- Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data☆25Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆79Updated 5 months ago