178 results for “topic:dlp”
Find secrets with Gitleaks 🔑
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
MSLA/DLP, file analysis, calibration, repair, conversion and manipulation
A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
Firewall for AI agents. DLP scanning, SSRF protection, bidirectional MCP scanning, tool poisoning detection, and prompt injection blocking.
A local AI-powered DLP solution
Finding exposed secrets and personal data in GitLab
Streaming Anomaly Detection Solution by using Pub/Sub, Dataflow, BQML & Cloud DLP
Strict DLP Chinese (SDC) is a set of strict DLP (Dynamic Leech Protection) DLLs based on the eMule Xtreme Mod's official version. SDC variants put easyMule v2, easyMule v1 and/or eMule VeryCD Mod into "Soft Ban" or "Hard Ban" list because of GPL violation, private network, community leeching, and other behaviors.
Multi Cloud Data Tokenization Solution By Using Dataflow and Cloud DLP
Examples scripts that showcase how to use Private AI Text to de-identify, redact, hash, tokenize, mask and synthesize PII in text.
参考《Windows内核安全与驱动开发》的透明加密解密Minifilter
Kernel-based Process Monitoring on Linux Endpoints for File System, TCP and UDP Networking Events and optionally DNS, HTTP and SYSLOG Application Messages via eBPF Subsystem
Monitoring GitHub for sensitive data shared publicly
This solution provides an automated, serverless way to redact sensitive data from PDF files using Google Cloud Services like Data Loss Prevention (DLP), Cloud Workflows, and Cloud Run.
Endpoint DLP
AI Agent Security Middleware — 8-layer defense, DLP data flow, prompt injection detection, zero dependencies. SDK + OpenClaw plugin.
Data Loss Prevention (DLP) Sample Data Files
天机办公安全平台是有安科技推出的一款全方位办公安全防护产品,包含DNS、SWG、CASB、FIDO2、PassKey、ZTNA、SASE、DLP等功能。
The Compliance Utility is a powerful tool that helps troubleshoot and diagnose sensitivity labels, policies, settings and more. Whether you need to fix issues or reset configurations, this tool gives you everything you need.
NanoDLP user interface
A browser based GPU accelerated 3D model slicer
Use Remote Functions to tokenize data with DLP in BigQuery using SQL
A python client used to interact with the Private AI's API
Monitoring your Slack Enterprise Grid for sensitive information
Advanced Interactive Security Workshop
Agent Identity Protocol - Zero-trust security layer for AI agents. Policy enforcement proxy for MCP with Human-in-the-Loop approval, DLP scanning, and audit logging.
Open-source, SLA 3D printing, for biomimetic prototyping.