subrose / thornLinks
🌹 Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.
☆22Updated last year
Alternatives and similar repositories for thorn
Users that are interested in thorn are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆119Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆75Updated 2 years ago
- An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights…☆22Updated 10 months ago
- ☆74Updated 4 months ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Updated 5 months ago
- SMSgate is an open source Python-based server for sending and especially receiving SMS using multiple GSM modems and SIM cards.☆189Updated 2 weeks ago
- Daily alert when a new domain name is registered and contains your keywords☆117Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆51Updated 6 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 8 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 2 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆72Updated 2 years ago
- Pull secrets from an AWS environment☆70Updated 5 years ago
- Selenium-based Python script to automate sending emails to warm up your sender reputation and improve email deliverability☆71Updated 2 years ago
- ☆23Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆33Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 11 months ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Technical Tabletop Exercises Simulation Framework☆48Updated last year
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Updated 4 years ago
- Subdomain enumeration using Cloudflare's scanning tool.☆46Updated last month
- ☆58Updated 2 years ago
- ☆17Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago