redglue / ReDiscoveryLinks
Sensitive Data Discovery tool
☆33Updated 7 years ago
Alternatives and similar repositories for ReDiscovery
Users that are interested in ReDiscovery are comparing it to the libraries listed below
Sorting:
- Sensitive Data Management: Data Discovery and Anonymization toolkit☆159Updated last month
- Apache Metron Workshop Lab materials and instructions.☆35Updated 6 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆103Updated 4 years ago
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆48Updated 6 months ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project…☆110Updated last year
- INTERCEPT / Policy as Code Auditing☆85Updated last month
- SIAC is an enterprise SIEM built on open-source technology.☆115Updated 7 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆123Updated last year
- DevSecOps Toolchain☆112Updated 8 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Simple parser for Splunk Processing Language (SPL) written in Python.☆35Updated 7 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- ☆11Updated 7 years ago
- The Security Dependency Orchestrator Service☆88Updated 5 years ago
- User interface for OpenSOC☆100Updated 10 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Loads STIX-2 into Neo4j☆25Updated 5 years ago
- Kibana nodejs/hapi plugin adds support for LDAP and 2-factor OTP authentication to dashboards.☆51Updated 3 years ago
- Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ans…☆56Updated 7 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- A GDPR Data Protection Impact Assessment (DPIA) tool to assist organisations to evaluate data protection risks with respect to the EU's G…☆49Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 9 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 6 months ago
- ☆14Updated 8 years ago
- Docker files for Security Onion☆42Updated 5 years ago