evilsocket / sum
A specialized database server for linear algebra and machine learning.
☆86Updated 2 years ago
Alternatives and similar repositories for sum:
Users that are interested in sum are comparing it to the libraries listed below
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆161Updated 2 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- 🧠 A tool that makes AI easier.☆295Updated 9 months ago
- Create automated tasks and keep an eye on interesting things!☆81Updated last month
- Fast Static File Analysis Framework☆103Updated 5 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- The noise swiss army knife☆44Updated 4 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings U…☆140Updated 7 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆16Updated 11 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- A framework for streamlining the capture of PANDA execution traces.☆56Updated 4 years ago
- Internet data processing tools☆54Updated 4 years ago
- CERT Tapioca for MITM network analysis☆182Updated 10 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- ☆66Updated 9 years ago