subrose / thornLinks
🌹 Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.
☆23Updated last year
Alternatives and similar repositories for thorn
Users that are interested in thorn are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated last year
- GitHub actions and GitLab CI templates run various vulnerability scanners, upload the results into SecObserve and make the results of the…☆18Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- Daily alert when a new domain name is registered and contains your keywords☆119Updated last year
- ☆17Updated 2 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆28Updated 4 years ago
- Fast and passive subdomain enumeration.☆17Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- ☆10Updated 3 years ago
- CLI component of OWASP PurpleTeam☆131Updated last year
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆43Updated 3 months ago
- A tool for detecting sensitive data in code repositories☆16Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆76Updated 2 years ago
- ☆75Updated 6 months ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- SMSgate is an open source Python-based server for sending and especially receiving SMS using multiple GSM modems and SIM cards.☆193Updated last month
- Golang installer for DefectDojo☆29Updated 7 months ago
- A curated list of security tools for Hackers & Builders!☆101Updated last year
- Polite, slim and concurrent web crawler.☆14Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 2 months ago
- Chat Bot Security Checklist☆29Updated 6 years ago
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆43Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆20Updated 2 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆21Updated last month