subrose / thorn
πΉ Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.
β21Updated 7 months ago
Related projects: β
- Distributed network and vulnerability scannerβ41Updated 6 months ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.β19Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β22Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feedsβ21Updated last year
- DefectDojo Community Contentβ17Updated 5 months ago
- Language-agnostic workflow builder. Modular code that goes from dev to prod in a minute with principled design decisions.β12Updated 6 months ago
- AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Serβ¦β12Updated 2 years ago
- Golang installer for DefectDojoβ23Updated 5 months ago
- Automation tool for Windows Deception Host Burn-Inβ71Updated 2 months ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs titleβ17Updated 4 years ago
- Security and compliance proxy for LLM APIsβ43Updated last year
- Backend logic implementation for Vulnerability Management Systemβ20Updated last year
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.β14Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysisβ12Updated 3 weeks ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python Fβ¦β13Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing researchβ21Updated 10 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.β23Updated this week
- GenAIPot is the first A.I honeypot that emulates services and using Generative AI to do that in order to be more stealth.β10Updated this week
- ZΓ©nith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, Oβ¦β1Updated last year
- A repository for maintaining a list of the top domains based on multiple listsβ19Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (Vβ¦β26Updated last month
- Jumpstart multiple WebSocket servers quicklyβ25Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).β27Updated 6 months ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Bucketsβ31Updated 3 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and β¦β25Updated 2 weeks ago
- A curated collection of tools and resources for building security with a developer first approach.β28Updated 2 years ago
- A UserScript to detect GPT generated comments on Hackernews.β13Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β20Updated 3 weeks ago
- A JupyterLab extension to evaluate the security of your Jupyter environmentβ36Updated last year
- β15Updated this week