Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.
☆15Apr 2, 2024Updated last year
Alternatives and similar repositories for NLTK-Sentiment-Analyser
Users that are interested in NLTK-Sentiment-Analyser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [DEPRECATED] Cybersecurity blog (HTML, CSS, JS)☆10Nov 25, 2023Updated 2 years ago
- A simple ATM interface (My first ever Python project!)☆11Jun 20, 2022Updated 3 years ago
- This (basic) AES and RSA file encryptor provides functions to encrypt and decrypt files using the AES and RSA cryptography algorithms. I…☆13Oct 8, 2023Updated 2 years ago
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- BB84 QKD simulation using the Python Qiskit library with various options: Simulation of a perfect implementation, low error rate, high er…☆13Feb 6, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniq…☆22Jul 21, 2023Updated 2 years ago
- ☆16Feb 21, 2024Updated 2 years ago
- CTF wirte-ups☆14Oct 18, 2020Updated 5 years ago
- Challenges and writeups for PatriotCTF 2023☆26Sep 11, 2023Updated 2 years ago
- xLEAPP - Merging of iLEAPP/RLEAPP/vLEAPP, ALEAPP, cLEAPP☆53Mar 23, 2026Updated last week
- Native Python3 bindings for @horsicq's Detect-It-Easy☆84Feb 20, 2026Updated last month
- Write-ups for CTF challenges.☆17Oct 4, 2021Updated 4 years ago
- Cybersecurity Notes☆169Apr 11, 2024Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆207Sep 20, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Apple BLE proximity pairing message spoofing☆1,868Jun 17, 2024Updated last year
- The scripts helps security analsts to identify misconfigured firebase instances.☆234Aug 9, 2022Updated 3 years ago
- Call Tree Overviewer☆398Aug 15, 2025Updated 7 months ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆325Jun 4, 2024Updated last year
- A (formerly) comprehensive guide to installing Coreboot on various laptops.☆290Jan 22, 2018Updated 8 years ago
- USB Keystroke Injection Protection☆548Jul 9, 2023Updated 2 years ago
- The hands-on NLTK tutorial for NLP in Python☆568Feb 27, 2026Updated last month
- Gophercloud: an OpenStack SDK for Go☆989Updated this week
- The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for ope…☆1,003Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A curated list of wordlists for bruteforcing and fuzzing☆1,222Feb 17, 2026Updated last month
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,394Updated this week
- A Chinese Nature Language Toolkit☆1,683Feb 17, 2020Updated 6 years ago
- GNOME Shell extension. See cosmic-epoch for COSMIC Epoch☆1,341Dec 15, 2025Updated 3 months ago
- A repository full of malware samples.☆1,576Dec 24, 2023Updated 2 years ago
- A curated list of free Windows software, online services and resources. Feel free to contribute!☆2,194May 24, 2025Updated 10 months ago
- Practical Ethical Hacking Labs 🗡🛡☆3,433Apr 23, 2024Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,936Updated this week
- Tools and Techniques for Red Team / Penetration Testing☆8,608Mar 18, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Official Code for Stable Cascade☆6,575Jul 25, 2024Updated last year
- Re-imagining Windows like a minimal OS install, already debloated with minimal impact for most functionality.☆6,382Oct 3, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated 2 weeks ago
- A natural language interface for computers☆62,853Feb 9, 2026Updated last month
- Devika is the first open-source implementation of an Agentic Software Engineer. Initially started as an open-source alternative to Devin.☆19,498Sep 25, 2025Updated 6 months ago
- A fully functional Android app built entirely with Kotlin and Jetpack Compose☆20,898Updated this week
- Lightweight fuzzy-search, in JavaScript☆20,048Mar 8, 2025Updated last year