Sensitive Data

Explore 12 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Microsoft Purview Information Protection Logo

Data classification and protection solution for Microsoft environments

0
ZeroThreat Logo

ZeroThreat is a cloud-based DAST platform that provides automated penetration testing and vulnerability detection for web applications and APIs with AI-driven remediation guidance.

0
weSecretFinder Logo

A Python script that scans file systems to identify hardcoded credentials, API keys, and other sensitive secrets using configurable regex patterns.

0
Kriptos Logo

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

0
gitGraber Logo

Monitor GitHub for sensitive data

0
Secret Bridge Logo

Secret Bridge monitors GitHub repositories to detect and alert on leaked secrets and sensitive data exposure.

0
Trufflehog-Chrome-Extension Logo

A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.

0
GitTools Logo

A collection of three tools for extracting, dumping, and scanning exposed .git repositories on websites to identify sensitive information and security vulnerabilities.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0
Yara4Pentesters Logo

A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.

0
SauronEye Logo

SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.

0
DumpsterDiver Logo

DumpsterDiver analyzes large datasets to detect hardcoded secrets, keys, and passwords using entropy calculations and customizable search rules.

0