mrwadams / takedown-gptLinks
TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedown requests for malicious / copyright infringing domains.
☆40Updated 3 weeks ago
Alternatives and similar repositories for takedown-gpt
Users that are interested in takedown-gpt are comparing it to the libraries listed below
Sorting:
- Collection of videos of Raids on Cybercriminals☆20Updated 3 months ago
- Strelka Web UI for File Submission and Analysis☆69Updated 3 weeks ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆70Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆111Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- URL fingerprinting made easy☆87Updated last year
- Graphical map of known Advanced Persistent Threats☆54Updated 3 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 7 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated 3 weeks ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 5 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆43Updated this week
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 8 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 3 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 6 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆27Updated 3 months ago
- Can you pay the ransom in your country?☆14Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆54Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated 3 weeks ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- ☆63Updated 2 years ago