mrwadams / takedown-gptLinks
TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedown requests for malicious / copyright infringing domains.
☆48Updated 2 weeks ago
Alternatives and similar repositories for takedown-gpt
Users that are interested in takedown-gpt are comparing it to the libraries listed below
Sorting:
- URL fingerprinting made easy☆90Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- Collection of videos of Raids on Cybercriminals☆21Updated 10 months ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆18Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆44Updated 2 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 3 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Can you pay the ransom in your country?☆14Updated 2 years ago
- Ransomware groups posts☆44Updated last week
- Daily updates from leaked data search engines, aggregators and similar services.☆143Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- Turn any blog into structured threat intelligence.☆51Updated this week
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆57Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Converting data from services like Censys and Shodan to a common data model☆51Updated last week
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- C2 Active Scanner☆59Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Maltego transformation for TON investigations☆24Updated 2 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Updated 2 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago