Skip to main content

Home/ Online Tools/ Group items tagged tool searchengine

Rss Feed Group items tagged

Janos Haits

VirusTotal - 4 views

  •  
    VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by the antivirus industry.
Janos Haits

Data Selfie _ Home - 6 views

  •  
    "We want to give you back your Facebook data. Data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal how machine learning algorithms use your data to gain insights about your personality."
Janos Haits

CVE security vulnerability database. Security vulnerabilities, exploits, references and... - 2 views

  •  
    "Looking for OVAL (Open Vulnerability and Assessment Language) definitions? http://www.itsecdb.com allows you to view exact details of OVAL(Open Vulnerability and Assessment Language) definitions and see exactly what you should do to verify a vulnerability. It is fully integrated with cvedetails so you will be able to see OVAL definitions related to a product or a CVE entry. "
Janos Haits

NewsBot - 4 views

  •  
    "Related news at the click of a button. Reading a great article? Quickly find more like it. Powered by machine learning."
Janos Haits

BabelNet | The largest multilingual encyclopedic dictionary and semantic network - 4 views

  •  
    "BabelNet is both a multilingual encyclopedic dictionary, with lexicographic and encyclopedic coverage of terms, and a semantic network which connects concepts and named entities in a very large network of semantic relations, made up of about 15 million entries, called Babel synsets. Each Babel synset represents a given meaning and contains all the synonyms which express that meaning in a range of different languages. Its evolution, BabelNet live, is a new, continuously growing resource, .."
Janos Haits

Malware Hunter - 3 views

  •  
    "Malware Hunter is a specialized Shodan crawler that explores the Internet looking for command & control (C2s) servers for botnets. It does this by pretending to be an infected client that's reporting back to a C2. Since we don't know where the C2s are located the crawler effectively reports back to every IP on the Internet as if the target IP is a C2. If the crawler gets a positive response from the IP then we know that it's a C2."
Janos Haits

SoundHound - Home - 1 views

  •  
    "Add a voice-enabled AI to anything."
Janos Haits

Bitcoin blokk felfedező - Blockchain - 3 views

  •  
    "Like paper money and gold before it, bitcoin is a currency that allows parties to exchange value. Unlike it predecessors, bitcoin is digital and decentralized. For the first time in history, people can exchange value without intermediaries which translates to greater control of funds and lower fees."
Janos Haits

eMusic - 2 views

  •  
    "Upload & store your entire collection in the eMusic cloud, for free. Sync, play and rediscover your music anytime, anywhere, on up to 5 connected devices."
Janos Haits

WorldCat: - 4 views

  •  
    "About WorldCat and is dedicated to offering you access to the widest possible range of resources. You are now able to search our collection and the collections of many other libraries worldwide using WorldCat, the world's largest network of library-based content and services."
Janos Haits

Has my email been hacked? - Anonymously check if your email has ever been compromised i... - 7 views

  •  
    "Has my email been hacked? Anonymously check if your email has ever been compromised in a security breach"
Janos Haits

Wiktionary - 1 views

  •  
    a wiki-based Open Content Dictionary
Janos Haits

CryptoMiso - Ranking cryptocurrencies based on Github commits - 2 views

  •  
    "Crypto commits Github commit history of 616 cryptocurrencies based on most popular repo "
Janos Haits

Ahmia - Tor hidden service search - 9 views

  •  
    Our mission is to create a working search engine for indexing, searching and cataloguing content present on the Tor network. Furthermore, we are creating an environment to share meaningful statistics, insights and news about the Tor network itself. Striving to support the Tor project, we are running exit nodes and tor2web nodes (tor2web.fi). We believe that the Tor network is an important, anonymous, resilient, censorship-resistant and distributed platform that can provide easy-to-implement anonymity to websites and other web services. Servers configured to receive inbound connections through Tor are called hidden services: rather than revealing a server's real IP address, an hi
  •  
    Our mission is to create a working search engine for indexing, searching and cataloguing content present on the Tor network. Furthermore, we are creating an environment to share meaningful statistics, insights and news about the Tor network itself. Striving to support the Tor project, we are running exit nodes and tor2web nodes (tor2web.fi). We believe that the Tor network is an important, anonymous, resilient, censorship-resistant and distributed platform that can provide easy-to-implement anonymity to websites and other web services. Servers configured to receive inbound connections through Tor are called hidden services: rather than revealing a server's real IP address, an hi
gomi21

Article Publishing - Free Use - 1 views

www.mabletech.com This site offers to publish unlimited articles of your own. However, writing should be passed quality guidelines.

searchengine maker creator tools online

started by gomi21 on 21 Jan 15 no follow-up yet
Janos Haits

IT Security Database. OVAL patch, vulnerability, compliance definitions data source - 1 views

  •  
    "This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists."
« First ‹ Previous 81 - 100 of 170 Next › Last »
Showing 20 items per page