eldraco / unanomalyLinks
A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in the data. No need to understand your dataset.
☆33Updated 2 years ago
Alternatives and similar repositories for unanomaly
Users that are interested in unanomaly are comparing it to the libraries listed below
Sorting:
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Plugins written for CVE-Search☆25Updated 4 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- Reading List for CSIRT Team Members☆17Updated 5 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Spam trap management☆23Updated 11 months ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Local Maltego Transforms for crt.sh☆12Updated 7 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it…☆20Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Search bing with python☆12Updated 10 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- miscellaneous scripts and things...☆21Updated 9 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- AYY LMAO☆22Updated 9 years ago
- Help summarize a PCAP file☆33Updated 13 years ago
- Phishing Toolkit☆20Updated 7 years ago