Datalake CLI scripts and python library for searching, lookuping, adding, tagging, editing score of threats in bulk
☆22Feb 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for datalake
Users that are interested in datalake are comparing it to the libraries listed below
Sorting:
- Docker setup for Pupy☆28Jul 23, 2023Updated 2 years ago
- A Python tool that uses AI to generate well-structured technical and educational articles from any topic. Features transparent reasoning,…☆17Apr 19, 2025Updated 10 months ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- ☆12Jan 22, 2026Updated last month
- Hengam: An Adversarially Trained Transformer for Persian Temporal Tagging (AACL'22)☆11Aug 25, 2023Updated 2 years ago
- Repo for MGraph project☆13Jan 10, 2026Updated last month
- ☆13Apr 16, 2025Updated 10 months ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- ☆14Aug 18, 2023Updated 2 years ago
- Create satisficing tables in R.☆17Jan 21, 2026Updated last month
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- react-trend for R based on reactR☆19Jan 4, 2023Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- ☆12Feb 16, 2024Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Groq + Google☆11Apr 27, 2024Updated last year
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Updated this week
- Advanced RAG + Raptor: A sophisticated document processing and retrieval system combining hierarchical document clustering with advanced …☆11Mar 29, 2025Updated 11 months ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- ☆12Feb 13, 2023Updated 3 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Frequency hopping spread spectrum analyzer and repeat attack program for use with a Nuand BladeRF☆10Apr 10, 2015Updated 10 years ago
- This development is designed to measure the content of harmful gases and dust particles using an unmanned aerial vehicle DJI.☆12Jun 28, 2018Updated 7 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- A curated list of tools with built-in support for right-to-left (RTL) languages☆14Oct 12, 2023Updated 2 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- ☆11Dec 21, 2017Updated 8 years ago
- A Terraform module for scheduling Vertex Pipeline runs using Google Cloud Scheduler☆13Dec 7, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Bellingcat Hackathon - Digital Investigation Tool 2022☆12Sep 25, 2022Updated 3 years ago