sandy9999 / Sih_Rk312_winterfell
Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & Column Structure) file format. Desired Solution: The solution should take different input file formats like .XLSX, .CSV, TXT. and it shall convert into Info Graphical and Data Visualizer forms with connected R…
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Sih_Rk312_winterfell
- Remembering numerous passwords from various different sites can be difficult for a user. So to provide some flexibility we can provide us…☆6Updated 2 years ago
- Solution to SIH 22 problem statement Smart Attendance☆8Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆19Updated 3 years ago
- A curated repository for minor and major projects alloted in schools and colleges☆21Updated 2 years ago
- recon-ng Maltego local transform pack☆38Updated 10 years ago
- ☆12Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 5 months ago
- ☆25Updated 4 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆45Updated last year
- Hashes of infamous malware☆25Updated last year
- Yet another OSINT automator.☆19Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A secure platform for storing of files using Hybrid Cryptography☆48Updated 2 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆8Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆10Updated 4 years ago
- Machine Learning for Phishing Website Detection☆54Updated 4 years ago
- Maltego integration of https://clearbit.com☆35Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Scripts related to offensiveosint.io☆20Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Updated 2 years ago
- ☆34Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆10Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆13Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- PS: RK774. Smart India Hackathon 2022 Winning Project by Team Vision. Vocational Training Application for persons with visual impairment.☆28Updated 3 months ago