Tools and techniques for safeguarding sensitive data and implementing robust encryption.Explore 85 curated tools and resources
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Monitor GitHub for sensitive data
A toolkit for testing, tweaking and cracking JSON Web Tokens
Monitors GitHub for leaked secrets
A browser extension that helps you find and track sensitive data exposure across the web.
A browser extension that helps you find and track sensitive data exposure across the web.
Obtain GraphQL API schema even if the introspection is disabled
A sensitive data detection tool for scanning source code repositories
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A steganographic coder for WAV files that hides data in the LSB portions of each sample.
A steganographic coder for WAV files that hides data in the LSB portions of each sample.
A command line tool for transparently hiding files within images using LSB steganography.
A command line tool for transparently hiding files within images using LSB steganography.
A PHP library for secure data encryption with easy-to-use API.
Steganographic Swiss army knife for encoding and decoding data into images.
Steganographic Swiss army knife for encoding and decoding data into images.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.