subrose / thornLinks
🌹 Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.
☆22Updated last year
Alternatives and similar repositories for thorn
Users that are interested in thorn are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆123Updated last year
- ☆18Updated 2 years ago
- A fast GitHub stargazers information gathering tool☆72Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 5 years ago
- SMSgate is an open source Python-based server for sending and especially receiving SMS using multiple GSM modems and SIM cards.☆199Updated last month
- Daily alert when a new domain name is registered and contains your keywords☆119Updated 2 years ago
- 🧬 Extract and analyze contributors info from git repos☆83Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆28Updated 2 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- CLI component of OWASP PurpleTeam☆134Updated 2 years ago
- Polite, slim and concurrent web crawler.☆14Updated 5 years ago
- Security and compliance proxy for LLM APIs☆50Updated 2 years ago
- ☆20Updated last week
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆47Updated 3 weeks ago
- A tool for detecting sensitive data in code repositories☆16Updated 3 weeks ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- Analyse binaries for missing security features, information disclosure and more...☆86Updated 2 years ago
- A command based package for simple display of statistics☆25Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Browser interface to Telegram's API with additional modules for generating datasets and network graphs☆13Updated 2 years ago
- Python Data Loss Prevention (DLP) SDK - Nightfall Developer Platform☆25Updated 2 years ago
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆52Updated 10 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆168Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Dependency Combobulator☆95Updated 2 years ago
- Scrape, Hunt, and Transform names and usernames☆125Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago