CIRCLean alternatives

Looking for an alternative tool to replace CIRCLean? During the review of CIRCLean we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Bleach (sanitizing library for Django)
  2. DocBleach (data sanitizing tool for documents)
  3. socat (data channel and transfer tool)

These tools are ranked as the best alternatives to CIRCLean.

Alternatives (by score)

85

Bleach

Introduction

Bleach is a library for Django that can sanitize HTML by escaping and stripping harmful content. It provides a filter for untrusted content and disarms potential unwanted scripts from the input. This may be useful to apply to data that is transmitted via HTML forms or otherwise.

Project details

Bleach is written in Python.

Strengths and weaknesses

  • + More than 25 contributors
  • + More than 1000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Data sanitizing

    Bleach review

    60

    DocBleach

    Introduction

    Tools like DocBleach are useful when dealing a lot with documents from external parties or even unknown entities. It can scan a system and disarm any possible harmful embedded data or code structures from documents.

    Project details

    DocBleach is written in Java.

    Strengths and weaknesses

    • + The source code of this software is available

      Typical usage

      • Data sanitizing

      DocBleach review

      59

      socat

      Introduction

      Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.

      Project details

      socat is written in C.

      Strengths and weaknesses

      • + The source code of this software is available
      • + Well-known tool

        Typical usage

        • Data encryption
        • Data transfers

        socat review

        56

        Metagoofil

        Introduction

        Metagoofil will perform a search in Google based on the given domain name. Any public documents will be downloaded and analyzed. For this task it uses libraries like Hachoir, PdfMiner, and others. Useful details include username, software versions, hostnames, etc.

        File types: pdf, doc, xls, ppt, docx, pptx, xlsx

        Project details

        Metagoofil is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Information gathering
          • Penetration testing

          Metagoofil review

          85

          PCredz

          Introduction

          This tool can be of a great use to see what sensitive data leaks onto the network. This may be a public network or your own private network.

          Project details

          PCredz is written in Python.

          Strengths and weaknesses

          • + The source code of this software is available

            Typical usage

            • Data extraction

            PCredz review

            60

            swap_digger

            Introduction

            Swap memory is similar to active memory and may contain sensitive details.

            Examples of sensitive data artifacts:

            • Login accounts and passwords
            • GPG keys
            • Master keys of password managers
            • Email addresses
            • WiFi SSID details and keys
            • Samba credentials
            • Other authentication details

            Project details

            swap_digger is written in shell script.

            Strengths and weaknesses

            • + The source code of this software is available

              Typical usage

              • Data extraction
              • Information gathering
              • Penetration testing

              swap_digger review

              70

              Xplico

              Introduction

              With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.

              Project details

              60

              USB Canary

              Introduction

              USB Canary is a tool to monitor the addition or removal of USB devices while a computer is locked. This small utility is written in Python and can provide an alert.

              Project details

              USB Canary is written in Python.

              Strengths and weaknesses

              • + More than 500 GitHub stars
              • + The source code of this software is available
              • - Full name of author is unknown

              Typical usage

              • Hardware security
              • System monitoring

              USB Canary review

              74

              USBGuard

              Introduction

              USBGuard would be used to define what devices are welcome and lock out the others. It uses a whitelist to define which devices are allowed and defines what they can do.

              Project details

              USBGuard is written in C++.

              Strengths and weaknesses

              • + The source code of this software is available
              • + Supported by a large company

                Typical usage

                • Hardware security
                • System hardening

                USBGuard review

                64

                USBleach

                Introduction

                USBleach disarms potential threats like USB Rubber Ducky (keystroke injection) and the BadUSB attack (man-in-the-middle), which can result in a compromised system. This toolkit decreases the risks involved of accepting untrusted USB devices.

                Project details

                USBleach is written in Lua, shell script.

                Strengths and weaknesses

                • + The source code of this software is available
                • - No releases on GitHub available
                • - Full name of author is unknown

                USBleach review

                Some relevant tool missing as an alternative to CIRCLean? Please contact us with your suggestion.