Segerberg / botjakten
Information about project #botjakten
☆51Updated 7 years ago
Alternatives and similar repositories for botjakten:
Users that are interested in botjakten are comparing it to the libraries listed below
- ☆95Updated 5 years ago
- Code and data release for our PETS 2018 paper: "I never signed up for this! Privacy implications of email tracking".☆46Updated 2 years ago
- Markov Chain Twitter Bot generator☆116Updated 2 years ago
- NYC Subway Turnstile Data☆120Updated last year
- Is there a relationship between popularity of a given technology on Stack Overflow (SO) and Hacker News (HN)? And a few words about causa…☆96Updated 6 years ago
- IoT device indexer and search engine.☆59Updated 5 years ago
- See the people Facebook thinks you know☆196Updated 2 years ago
- Discover SPOF in DNS dependency graphs☆66Updated 7 years ago
- My in-network Node app for controlling my kids' nightlights (like Hue or FastLED) via website or IoT buttons☆119Updated 2 years ago
- Searches for pronbots by looking at followers/following☆92Updated 7 years ago
- Load Illinois political contribute and spending data efficiently☆56Updated 4 years ago
- An unofficial Microsoft Machine Learning Server Docker image.☆143Updated 7 years ago
- Our software set-up for building your own image☆37Updated 7 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- A FiveThirtyEight/The Marshall Project effort to collect comprehensive data on police misconduct settlements from 2010-19.☆150Updated 3 years ago
- An analysis of historical Hacker News data to determine the ranking algorithm☆85Updated 8 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Updated 7 years ago
- The code used in the "Don't @ Me: Hunting Twitter Bots at Scale" Black Hat presentation☆151Updated 4 years ago
- Tool to verify DKIM signatures on an mbox of emails☆95Updated 6 years ago
- PwnedPasswords as a Service☆25Updated 6 years ago
- Exploring retweets by Twitter bot-nets.☆11Updated 7 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Simple NLP and bulk OCR text processing script suite.☆47Updated 6 years ago
- A basic tool for pushing a web page to multiple archiving services at once.☆215Updated 10 months ago
- Report and raw data about privacy leaks in Grindr.☆18Updated 7 years ago
- Federal Crime Data Standardization and Analysis — The Trace and BuzzFeed News☆35Updated 6 years ago
- Inside hundreds of surveillance experiments along the US-Mexico border☆127Updated 5 years ago