Redactinator was built out of real-world experience — years spent in IT, cybersecurity, and compliance, handling the critical (and often tedious) task of preparing infrastructure files for safe sharing.
Troubleshooting logs, configuration dumps, and diagnostic files often contain sensitive details like IP addresses and internal hostnames. Manually scrubbing these files is time-consuming and prone to human error. That’s where Redactinator comes in.
🚀 What It Does
Redactinator automates the redaction process for:
- IP addresses (IPv4)
- Custom hostnames (defined by you)
- Files and folders, including both contents and names
It works recursively across directories and offers two modes:
- Destructive: Redacts in-place, overwriting sensitive data
- Non-destructive: Scans files, generates a full report of findings without modifying anything
📄 Supported Formats
Redactinator can scan and redact:
.txt
,.log
,.csv
,.conf
,.html
,.ini
,.json
,.md
,.xml
.yaml
,.yml
,.cfg
,.toml
,.env
,.properties
,.plist
,.settings
,.config
.docx
and.xlsx
- Files embedded in
.zip
,.tgz
,.tar.gz
, and.tar
archives - Unknown extensions with text content (automatically converted and scanned)
📊 Logging & Data Visualization
Every scan or redaction is tracked with:
- A comprehensive log showing all detected and redacted items
- Summary statistics on file types, redaction counts, and patterns found
- Data visualizations (charts and tables) to help teams quickly understand where sensitive data was located and how often it appears
This makes Redactinator ideal not just for redaction — but for auditing and infrastructure hygiene reviews as well.
🔐 Why It Matters
By making file redaction and detection faster, safer, and more transparent, Redactinator helps teams:
- Share logs without risking data leaks
- Stay compliant with frameworks like NERC CIP
- Collaborate across departments securely
Redactinator is a lightweight yet powerful desktop tool — bridging the gap between brute-force text editing and heavyweight DLP platforms. Whether you're cleaning logs, preparing data for a SOC review, or generating a scan report for audit purposes, Redactinator delivers fast, traceable, and secure results — with or without redacting the original files.
Developer
Strategic IT professional and former CIO with hands-on expertise in securing and managing high-availability networks, medical systems, and critical infrastructure SCADA environments. Skilled at aligning IT strategy with business goals, driving modernization, and ensuring compliance in regulated sectors. Proven success leading teams and managing IT operations across healthcare, manufacturing, and utility sectors.
Gabriel Atkinson
Projects & Public Engagement
- Creator – The Net Sys Admin:
Author of a personal blog focused on real-world network and systems administration practices, cybersecurity, career growth, and industry trends.
- Udemy Instructor – Basic Ubiquiti UniFi Network Setup:
https://www.udemy.com/basic-ubiquiti-unifi-network-setup/
Created and published a self-paced course with 16,000+ students worldwide, teaching foundational skills for setting up Ubiquiti UniFi networks. I created the course in 2017 and it is dated but it maintains a 4.5-star rating with over 1,500 reviews.
- Developer – Redactinator:
Designed and built a desktop application that redacts sensitive information (hostnames, IP Addresses, SSN’s, PII, or any desired string) from text or documents. Used in cybersecurity, compliance, and IT operations workflows. The application was developed with Python and AI.
- Personal Online Resume: