subrose / thorn
πΉ Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.
β22Updated last year
Alternatives and similar repositories for thorn:
Users that are interested in thorn are comparing it to the libraries listed below
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities lβ¦β49Updated 2 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feedsβ25Updated last year
- Open Privacy Vault - Secure, Performant, Open Source PII as a Service.β50Updated 10 months ago
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.β27Updated last week
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.β14Updated last year
- Language-agnostic workflow builder. Modular code that goes from dev to prod in a minute with principled design decisions.β13Updated last year
- Security and compliance proxy for LLM APIsβ46Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β39Updated 7 months ago
- A Python script to list valid emails of GSuite accounts.β14Updated last month
- Service that scans your Infrastructure as Code for common vulnerabilitiesβ48Updated last year
- Pull secrets from an AWS environmentβ70Updated 5 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runtiβ¦β54Updated 3 months ago
- Distributed network and vulnerability scannerβ47Updated last year
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.β69Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β66Updated 9 months ago
- A fast GitHub stargazers information gathering toolβ73Updated 3 years ago
- Squey is a visualization software designed to interactively explore and understand large amounts of tabular data (this is the read-only mβ¦β22Updated 2 months ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,β¦β20Updated last month
- NetSPI HTTP Scrapersβ27Updated 5 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.β20Updated last year
- β17Updated last year
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs titleβ17Updated 4 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for multβ¦β13Updated 5 months ago
- Golang installer for DefectDojoβ27Updated 2 months ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! π₯¬β13Updated 10 months ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machinβ¦β9Updated 3 years ago
- β15Updated 8 months ago
- roundrobin with configurable rotating strategiesβ15Updated last year
- β9Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple listsβ21Updated 2 years ago