Create and control keys used to encrypt or digitally sign your data. Centrally manage keys and define policies across integrated services and applications from a single point. Encrypt data within your applications with the AWS Encrypt.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.
A project focusing on deconstructing and utilizing data for security using Python modules like IPython, Pandas, and Scikit Learn.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A demonstration of a method to delete a locked executable or currently running file from disk.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
A tool for securely backing up and versioning production secrets or shared passwords
A command line tool for transparently hiding files within images using LSB steganography.
de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.
A versatile steganography tool with various installation options and detailed usage instructions.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.