The Panama Papers dataset and guide from the International Consortium of Investigative Journalists (ICIJ)
☆17Oct 25, 2024Updated last year
Alternatives and similar repositories for icij-panama-papers
Users that are interested in icij-panama-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hands-on LAB - Databricks SQL☆26Jul 16, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- An easy-to-use Python library for lightning-fast persistent function caching.☆18May 3, 2025Updated 10 months ago
- Statistical test for bias in unsupervised image representations.☆12Mar 8, 2021Updated 5 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆17Nov 29, 2025Updated 4 months ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A text-to-audio model for generating text-conditioned drum beats☆21Apr 25, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Patches to games so they run on macOS☆19Jul 23, 2024Updated last year
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- Master Kali Linux, Excel in Offensive Security☆32Jun 15, 2025Updated 9 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Mirror of Apache OpenNLP Add-ons☆19Mar 21, 2026Updated last week
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆12Jun 9, 2020Updated 5 years ago
- An ongoing statistical analysis of Dota Fantasy for the Dota Pro Circuit☆14Jul 9, 2023Updated 2 years ago
- Implement reinforcement learning(RL) based on parameterized quantum circuits with quantum computing cloud Quafu.☆11Oct 19, 2023Updated 2 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Finding accounts that appear to coordinate their behaviour in social media.☆14Dec 8, 2022Updated 3 years ago
- Work-in-progress list of funding opportunities for the digital humanities☆14Jan 15, 2016Updated 10 years ago
- Fine tuning of the Retrieval-Augmented Generation (RAG) with a custom knowledge source.☆13Feb 10, 2021Updated 5 years ago
- A package for accessing InfluxDB from Laravel 5.5+, based on configuration settings.☆13Mar 21, 2019Updated 7 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- 🚗 A curated list of resources for learning about vehicle security and safety.☆19Jul 10, 2019Updated 6 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Docker image to download and run panama papers database in Neo4j☆15Aug 25, 2016Updated 9 years ago
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- Incident Management System for EC☆14Mar 3, 2023Updated 3 years ago
- Code snippets, datasets and other lexical resources developed under the research project "Sinhala News Analysis Using Text Mining and Mac…☆13Dec 17, 2019Updated 6 years ago