A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
security
hacking
penetration-testing
pentesting
database-vulnerability-scanners
information-security
scanners
vulnerability-scanners
hacker-tools
security-tools
privacy-protection
pentesting-tools
redteam-tools
-
Updated
Sep 29, 2021
In the existing sample for batch analysis, the logic goes over all the columns and looks for PII. We'd like to extend this with logic which also evaluates how likely a column contains PII based on its name.
For example, if a column name is
Age
, and the values are[19,55,2,39]
, the column name coul