eldraco / unanomaly
A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in the data. No need to understand your dataset.
☆33Updated 2 years ago
Alternatives and similar repositories for unanomaly:
Users that are interested in unanomaly are comparing it to the libraries listed below
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Local Maltego Transforms for crt.sh☆12Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Search bing with python☆12Updated 10 years ago
- Spam trap management☆23Updated 10 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 6 months ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆22Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it…☆20Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- ☆10Updated 9 years ago
- ☆27Updated 7 years ago