Trufflehog-Chrome-Extension is a browser extension that helps you find and track sensitive data exposure across the web. It uses a combination of machine learning and data science to identify and alert you to potential data breaches. With Trufflehog-Chrome-Extension, you can: * Find sensitive data exposure across the web * Track and monitor data breaches * Get alerts and notifications for potential data breaches Trufflehog-Chrome-Extension is a powerful tool for anyone who wants to stay on top of data security and protect their sensitive information.
FEATURES
ALTERNATIVES
Microsoft Azure service for safeguarding cryptographic keys and secrets.
A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.
Red October is a software-based two-man rule style encryption and decryption server.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.