eldraco / unanomalyLinks
A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in the data. No need to understand your dataset.
☆33Updated 2 years ago
Alternatives and similar repositories for unanomaly
Users that are interested in unanomaly are comparing it to the libraries listed below
Sorting:
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Spam trap management☆23Updated last year
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Plugins written for CVE-Search☆25Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 6 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Fun with Amazon AWS and Maltego☆30Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Local Maltego Transforms for crt.sh☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago