eldraco / unanomaly
A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in the data. No need to understand your dataset.
☆33Updated 2 years ago
Alternatives and similar repositories for unanomaly:
Users that are interested in unanomaly are comparing it to the libraries listed below
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it…☆19Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Spam trap management☆23Updated 7 months ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Help summarize a PCAP file☆33Updated 13 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Local Maltego Transforms for crt.sh☆12Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Phishing Toolkit☆20Updated 6 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Python bindings for Yeti's API☆18Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- Search bing with python☆12Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago