EANN-KDD18EANN: event-adversarial neural networks for multi-modal fake news detection
Stars: ✭ 171 (-68.51%)
GNN-FakeNewsA collection of GNN-based fake news detection models.
Stars: ✭ 127 (-76.61%)
buttonsMake sharing fast and secure.
Stars: ✭ 18 (-96.69%)
ChroniclePublic append-only ledger microservice built with Slim Framework
Stars: ✭ 429 (-20.99%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-95.76%)
WeiboCrawler无cookie版微博爬虫,可以连续爬取一个或多个新浪微博用户信息、用户微博及其微博评论转发。
Stars: ✭ 45 (-91.71%)
Lets-Talk-MoviesA Social media desktop web app where movie fans can post their opinions about movies or series they've watched, like opinions, follow their friends or other users whose content they enjoy consuming.
Stars: ✭ 12 (-97.79%)
WeFEND-AAAI20Dataset for paper "Weak Supervision for Fake News Detection via Reinforcement Learning" published in AAAI'2020.
Stars: ✭ 67 (-87.66%)
PowerSponsePowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.
Stars: ✭ 35 (-93.55%)
SkyarkSkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Stars: ✭ 526 (-3.13%)
assisted-log-enabler-for-awsAssisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
Stars: ✭ 167 (-69.24%)
pH4Social📣 Social Networking Software built with Laravel PHP framework and Bootstrap.
Stars: ✭ 27 (-95.03%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (-77.53%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-34.62%)
AsnASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation and geolocation lookup tool / Traceroute server
Stars: ✭ 242 (-55.43%)
ts-serverlessTelar Social Network using OpenFaaS and Kubernetes. Run your own server-less social network. One command from OpenFaaS Cloud to build Social Network.
Stars: ✭ 34 (-93.74%)
Vast🔮 Visibility Across Space and Time
Stars: ✭ 227 (-58.2%)
SteadyAnalyses your Java and Python applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy. https://eclipse.github.io/steady/
Stars: ✭ 423 (-22.1%)
social-media-profilerFind information from Twitter, Instagram, LinkedIn and Google Search about a person.
Stars: ✭ 34 (-93.74%)
ScotSandia Cyber Omni Tracker (SCOT)
Stars: ✭ 206 (-62.06%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (-34.99%)
DaProfilerDaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-89.32%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-65.01%)
ArgusTime series monitoring and alerting platform.
Stars: ✭ 468 (-13.81%)
OsctrlFast and efficient osquery management
Stars: ✭ 183 (-66.3%)
tapit-appApp which lets two people share their social media details by simply putting one phone on top of the other ("tapping"). Currently in development by Nikita Mounier.
Stars: ✭ 18 (-96.69%)
Imago ForensicsImago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (-67.77%)
PraecoElasticsearch alerting made simple.
Stars: ✭ 342 (-37.02%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-69.06%)
crabberA Twitter clone written in Python + Flask with extended features and a focus on inclusivity.
Stars: ✭ 42 (-92.27%)
SocialApp-React-NativeSocial Networking mobile app similar to Instagram in React Native.
Stars: ✭ 79 (-85.45%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (-22.84%)
foodieA social media for food lovers and for people looking for new ideas for their next menu.
Stars: ✭ 30 (-94.48%)
Myscanmyscan 被动扫描
Stars: ✭ 373 (-31.31%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-48.62%)
SimpleSocialA simple social network web application using ASP.NET Core 3.1
Stars: ✭ 16 (-97.05%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-73.66%)
Advertoolsadvertools - online marketing productivity and analysis tools
Stars: ✭ 341 (-37.2%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-75.32%)
Flutter-Photoarc-app(Full-stack) Fully functional social media app (Instagram clone) written in flutter and dart with backend node.js and Postgres SQL.
Stars: ✭ 38 (-93%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-7.92%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-81.58%)
jsonmonQuick and simple monitoring and alerting system
Stars: ✭ 28 (-94.84%)
AwesomeA curated list of awesome things related to TheHive & Cortex
Stars: ✭ 88 (-83.79%)
Ocelot-SocialFree and open-source social network for active citizenship.
Stars: ✭ 49 (-90.98%)
EyeballerConvolutional neural network for analyzing pentest screenshots
Stars: ✭ 416 (-23.39%)
snmp notifierA webhook to relay Prometheus alerts as SNMP traps, because sometimes, you have to deal with legacy
Stars: ✭ 33 (-93.92%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (-48.43%)
Instagram[READ ONLY] Subtree split of the SocialiteProviders/Instagram Provider (see SocialiteProviders/Providers)
Stars: ✭ 34 (-93.74%)
PepaversePepaverse is an open source social network build with nodejs, mongoDB, passportjs and socket.io
Stars: ✭ 16 (-97.05%)
SipviciousSIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems.
Stars: ✭ 541 (-0.37%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-0.92%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-4.79%)
Vulscanvulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (-10.5%)