An authorship attribution project with particular emphasis on Twitter analysis
☆17Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for stylext
Users that are interested in stylext are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Aug 28, 2015Updated 10 years ago
- an experimental implementation of Burrow's delta in Python 3☆21Oct 1, 2021Updated 4 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- People tracker on the Internet: Learn to track the world, to avoid being traced.☆12Jan 2, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python wrapper for the Spyonweb API. Not affiliated with SpyOnWeb.com or DevHQ.☆20Mar 16, 2017Updated 9 years ago
- A collection of hacking / penetration testing resources to make you better!☆17Jun 25, 2018Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Provides a method unix_time which returns elapsed time since UNIX EPOCH. The returned time can be faked in each thread separately.☆12May 19, 2021Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated 11 months ago
- A tool to create human-writable versions of your PGP paperkey backup.☆10Jul 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆33Feb 3, 2026Updated last month
- Code and datasets for the paper entitled "Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devices".☆36Jan 25, 2018Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- H3 Compression Algorithms: compression schemes tailored for H3 cell indexes.☆16Aug 20, 2025Updated 7 months ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Update an ECS service to use a new Docker image☆13Mar 1, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Jul 21, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- 10 MHz 3 channel distribution amplifier and low pass filter designed to integrate in a BG7TBL GPSDO☆11Nov 11, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tools for automated grading of python assignments.☆10Jul 6, 2019Updated 6 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- Rust wrapper around a bit of osascript☆17May 24, 2017Updated 8 years ago
- ☆10Feb 28, 2021Updated 5 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Doppelganger-finder finds multiple accounts (doppelgangers) of a user.☆37Dec 20, 2013Updated 12 years ago
- Tool for removing duplicate bookmarks and merge directories in firefox json bookmarks backup☆16Jul 18, 2023Updated 2 years ago