PII detection platform, leveraging human-in-the-loop AI
☆53Nov 29, 2024Updated last year
Alternatives and similar repositories for PIIDetective
Users that are interested in PIIDetective are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆20Apr 10, 2025Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆56Dec 13, 2025Updated 4 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆291May 16, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated 3 months ago
- ☆382Apr 18, 2024Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Mar 30, 2026Updated 2 weeks ago
- Generate datasets of cloud audit logs for common attacks☆236Apr 6, 2026Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 8 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆163Nov 21, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Expand IAM Actions with Wildcards☆35Apr 6, 2026Updated last week
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last month
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Live validation proxy tool for testing web app vulnerabilities☆844Mar 24, 2026Updated 3 weeks ago
- GitHub Actions for interacting with Sentry.io☆14Jun 8, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆19Jul 25, 2025Updated 8 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆11Mar 18, 2025Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆120Apr 6, 2026Updated last week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Examine Chrome extensions for security issues☆97Nov 16, 2025Updated 4 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Automated web vulnerability scanning with LLM agents☆459Jun 18, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- poutine, a supply chain vulnerability scanner for build pipelines☆404Apr 8, 2026Updated last week
- Watch LLMs duke it out on a simulated CPU space.☆18Mar 7, 2025Updated last year
- Whole-infrastructure automation tooling for AWS☆43Aug 22, 2025Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- A blazingly fast event stream processing library powering the reveald event processing daemon.☆145Apr 2, 2026Updated last week