CIRCLean alternatives
Looking for an alternative tool to replace CIRCLean? During the review of CIRCLean we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Alternatives (by score)
Bleach
Introduction
Bleach is a library for Django that can sanitize HTML by escaping and stripping harmful content. It provides a filter for untrusted content and disarms potential unwanted scripts from the input. This may be useful to apply to data that is transmitted via HTML forms or otherwise.
Project details
Bleach is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Data sanitizing
DocBleach
Introduction
Tools like DocBleach are useful when dealing a lot with documents from external parties or even unknown entities. It can scan a system and disarm any possible harmful embedded data or code structures from documents.
Project details
DocBleach is written in Java.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data sanitizing
socat
Introduction
Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.
Project details
socat is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Data encryption
- Data transfers
Metagoofil
Introduction
Metagoofil will perform a search in Google based on the given domain name. Any public documents will be downloaded and analyzed. For this task it uses libraries like Hachoir, PdfMiner, and others. Useful details include username, software versions, hostnames, etc.
File types: pdf, doc, xls, ppt, docx, pptx, xlsx
Project details
Metagoofil is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Information gathering
- Penetration testing
PCredz
Introduction
This tool can be of a great use to see what sensitive data leaks onto the network. This may be a public network or your own private network.
Project details
PCredz is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data extraction
Xplico
Introduction
With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.
Project details
swap_digger
Introduction
Swap memory is similar to active memory and may contain sensitive details.
Examples of sensitive data artifacts:
- Login accounts and passwords
- GPG keys
- Master keys of password managers
- Email addresses
- WiFi SSID details and keys
- Samba credentials
- Other authentication details
Project details
swap_digger is written in shell script.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data extraction
- Information gathering
- Penetration testing
USB Canary
Introduction
USB Canary is a tool to monitor the addition or removal of USB devices while a computer is locked. This small utility is written in Python and can provide an alert.
Project details
USB Canary is written in Python.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Hardware security
- System monitoring
USBGuard
Introduction
USBGuard would be used to define what devices are welcome and lock out the others. It uses a whitelist to define which devices are allowed and defines what they can do.
Project details
USBGuard is written in C++.
Strengths and weaknesses
- + The source code of this software is available
- + Supported by a large company
Typical usage
- Hardware security
- System hardening
USBleach
Introduction
USBleach disarms potential threats like USB Rubber Ducky (keystroke injection) and the BadUSB attack (man-in-the-middle), which can result in a compromised system. This toolkit decreases the risks involved of accepting untrusted USB devices.
Project details
USBleach is written in Lua, shell script.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
- - Full name of author is unknown
Some relevant tool missing as an alternative to CIRCLean? Please contact us with your suggestion.