annotated dataset of cyber-security related tweets
☆22May 10, 2021Updated 4 years ago
Alternatives and similar repositories for cybertweets
Users that are interested in cybertweets are comparing it to the libraries listed below
Sorting:
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- ☆24Dec 4, 2020Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 10 years ago
- A collection of code (mostly Jupyter notebooks) associated with entries on my blog☆12Oct 8, 2017Updated 8 years ago
- The lazy way to run multi-statement Neo4j Cypher scripts from the web☆11Nov 21, 2016Updated 9 years ago
- Code for drought detection and attribution using tree-ring reconstructions☆11Feb 19, 2019Updated 7 years ago
- A platform of detailed R programming codes for Data Analytics☆16Sep 24, 2014Updated 11 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- The Experience API / XAPI / tincan api integration provider for Sakai☆11Mar 25, 2021Updated 4 years ago
- ☆11Jan 28, 2019Updated 7 years ago
- Text Mining Library with a focus on Latent Semantic Analysis☆12Aug 4, 2013Updated 12 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A protovis visualization of the linked open data cloud.☆26Jul 25, 2011Updated 14 years ago
- A tool to check for potential open source licensing problems.☆12Aug 17, 2016Updated 9 years ago
- This app leverages the Adaptive Response framework to perform API calls to Security Trails☆15Feb 14, 2019Updated 7 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Accmut is a framework for acclerating mutation testing, which is based on LLVM-IR.☆10Jan 25, 2018Updated 8 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- A collection of small corpuses of interesting data for the creation of bots and similar stuff.☆10Sep 26, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- evolution of extant software☆24Jan 24, 2018Updated 8 years ago
- A (simple) performance evaluation of proportional selection using Python.☆11Jul 2, 2015Updated 10 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- ☆10Mar 20, 2020Updated 5 years ago
- Modification of SOMPY repo with robust K-means clustering (bootstrapped SSE elbow method)☆13Apr 6, 2019Updated 6 years ago
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 5 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- A library for parsing security advisories☆13Feb 5, 2026Updated last month