DFRLab / Dichotomies-of-DisinformationView external linksLinks
☆67Feb 5, 2020Updated 6 years ago
Alternatives and similar repositories for Dichotomies-of-Disinformation
Users that are interested in Dichotomies-of-Disinformation are comparing it to the libraries listed below
Sorting:
- A GETTR API client written in Python.☆13Jul 14, 2021Updated 4 years ago
- Books, advice notes, and useful lists, written for people running and working on disinformation deployments☆16Mar 11, 2021Updated 4 years ago
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆52Feb 24, 2022Updated 3 years ago
- CIB Analysis Data☆20May 10, 2020Updated 5 years ago
- Stanford Internet Observatory publications☆14Dec 2, 2021Updated 4 years ago
- Run N|Solid in Azure☆14Jul 28, 2023Updated 2 years ago
- iVerify Apps: Apps that support the AI-powered iVerify platform to combat misinformation and hate speech☆31Feb 10, 2026Updated last week
- The Social Media Lab's Fact Check Assistant is an AI-powered bot for simple fact checking. It was created as demo for the Social Media La…☆14Updated this week
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- This collaborative resource aims at empowering all actors countering information manipulation to grow and improve.☆16Dec 23, 2025Updated last month
- AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs …☆243Jul 3, 2022Updated 3 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Scrum Card Game: Scrum Sprint Simulation played as a multi-player card game☆25Jan 12, 2017Updated 9 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Scoring tools for Media Forensics Evaluations☆27Apr 22, 2021Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Utilities & scripts to collect and find insight from social network data and users.☆27May 28, 2025Updated 8 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated 2 weeks ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Nov 11, 2014Updated 11 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 9 months ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- Given a set of URLs, this packages detects coordinated link sharing behavior on social media and outputs the network of entities that per…☆75Aug 14, 2024Updated last year
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆13Feb 10, 2026Updated last week
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- DBCA IT assets management system☆13Updated this week
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Companion to textbook "Decision Support Systems: Introduction to Data Science with Applications"☆26Sep 21, 2022Updated 3 years ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆39Oct 26, 2022Updated 3 years ago