mrwadams / takedown-gptLinks
TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedown requests for malicious / copyright infringing domains.
☆43Updated 3 months ago
Alternatives and similar repositories for takedown-gpt
Users that are interested in takedown-gpt are comparing it to the libraries listed below
Sorting:
- Collection of videos of Raids on Cybercriminals☆20Updated 6 months ago
- URL fingerprinting made easy☆89Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 3 months ago
- Strelka Web UI for File Submission and Analysis☆72Updated last week
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆50Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Data from Dark Web Marketplace scraping - Be careful☆41Updated 10 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆77Updated last month
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆43Updated 2 months ago
- ☆96Updated last month
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆17Updated 8 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 5 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆112Updated last week
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Updated 2 years ago
- Turn any blog into structured threat intelligence.☆38Updated last week
- Can you pay the ransom in your country?☆15Updated last year
- ☆19Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 3 weeks ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 5 years ago