abhilashreddys / Fake-News-ArticleLinks
Detecting fake news articles by analyzing patterns in writing.
☆10Updated 5 years ago
Alternatives and similar repositories for Fake-News-Article
Users that are interested in Fake-News-Article are comparing it to the libraries listed below
Sorting:
- subdomain list based on Common Crawl data, sorted by popularity☆17Updated 5 years ago
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- ☆16Updated 5 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated 11 months ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- HoneyDB Python Module☆14Updated last year
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Security scanner using YARA☆17Updated this week
- Some ELF Malwares☆10Updated 3 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆15Updated last year
- The long shadow to emerge as other Git repositories☆18Updated last year
- Some good feeds for people who seriously want to keep up to date with InfoSec news and tech☆13Updated 7 years ago
- ☆15Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last month
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- CloudFlare Worker Shell☆14Updated 5 years ago