PII detection platform, leveraging human-in-the-loop AI
☆54Nov 29, 2024Updated last year
Alternatives and similar repositories for PIIDetective
Users that are interested in PIIDetective are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆20Apr 10, 2025Updated 11 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆56Dec 13, 2025Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆289May 16, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated 2 months ago
- ☆382Apr 18, 2024Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Mar 18, 2026Updated last week
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆161Nov 21, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆290Feb 5, 2024Updated 2 years ago
- Expand IAM Actions with Wildcards☆35Mar 14, 2026Updated last week
- Gram is Klarna's own threat model diagramming tool☆331Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated last month
- GitHub Actions for interacting with Sentry.io☆14Jun 8, 2019Updated 6 years ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 8 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆11Mar 18, 2025Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆119Mar 15, 2026Updated last week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Examine Chrome extensions for security issues☆97Nov 16, 2025Updated 4 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Automated web vulnerability scanning with LLM agents☆457Jun 18, 2025Updated 9 months ago
- boostsecurityio/poutine☆385Mar 10, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆117Feb 11, 2026Updated last month
- Watch LLMs duke it out on a simulated CPU space.☆18Mar 7, 2025Updated last year
- Lakera - ChatGPT Data Leak Protection☆29Jul 4, 2024Updated last year
- Whole-infrastructure automation tooling for AWS☆43Aug 22, 2025Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Mar 18, 2026Updated last week
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago