abhilashreddys / Fake-News-ArticleLinks
Detecting fake news articles by analyzing patterns in writing.
☆10Updated 5 years ago
Alternatives and similar repositories for Fake-News-Article
Users that are interested in Fake-News-Article are comparing it to the libraries listed below
Sorting:
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- ☆16Updated 6 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆15Updated last year
- ☆21Updated last year
- DNS logging, detection, ...☆15Updated 3 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- HoneyDB Python Module☆14Updated last year
- Network Traffic Fuzzer☆18Updated 10 months ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- ☆16Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- ☆12Updated last year
- Free Email Providers☆11Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- wsnet☆27Updated last month
- ☆18Updated 2 years ago
- Open YARA scan- and search engine☆25Updated 8 months ago