mrwadams / takedown-gptLinks
TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedown requests for malicious / copyright infringing domains.
☆40Updated this week
Alternatives and similar repositories for takedown-gpt
Users that are interested in takedown-gpt are comparing it to the libraries listed below
Sorting:
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- Strelka Web UI for File Submission and Analysis☆69Updated last week
- This is a repository to experiment with MCP for security☆39Updated 5 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated this week
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 2 months ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆52Updated 2 weeks ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated 3 weeks ago
- Turn any blog into structured threat intelligence.☆32Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆16Updated 5 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆44Updated 3 years ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated this week