A quantitative study comprising Twitter discussions and thematic analysis for COVID-19 vaccines
☆38May 8, 2022Updated 3 years ago
Alternatives and similar repositories for Analyzing-Twitter-Trends-On-COVID-19-Vaccinations
Users that are interested in Analyzing-Twitter-Trends-On-COVID-19-Vaccinations are comparing it to the libraries listed below
Sorting:
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- ☆15Oct 7, 2020Updated 5 years ago
- AWS Lambda function with Pandas, Sklearn, Scipy, Numpy and Chainer☆15Oct 14, 2016Updated 9 years ago
- Deploy Microsoft Healthcare Bot Reference Architecture.☆16Apr 1, 2020Updated 5 years ago
- scikit-learn: machine learning in Python☆18Oct 16, 2021Updated 4 years ago
- A knowledge base of best practices for application security☆29Aug 10, 2023Updated 2 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- NLP/ML面试各类资料链接 汇总(主要Github收集)☆11Mar 3, 2020Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 8 months ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- Code and data from the paper "Targeted Nonlinear Adversarial Perturbations in Images and Videos".☆11Sep 8, 2018Updated 7 years ago
- Orchestrate web crawlers to create structured datasets from multiple data sources with YAML configs.☆15Dec 8, 2022Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- 软件测试课程资料☆11Dec 1, 2023Updated 2 years ago
- A simple web scraper using Python, Selenium, and requests-html to grab screenshots of google ads landing pages☆14Feb 12, 2020Updated 6 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago