Adaptive eXocortex & Integrated Outer Memory Framework
☆34Mar 15, 2020Updated 6 years ago
Alternatives and similar repositories for axiom-framework
Users that are interested in axiom-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Add information from CDP or LLDP to SCCM Hardware Inventory☆15May 14, 2021Updated 4 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 7 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 5 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 10 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Simple checklists for stress-free travels built with React Native☆10Apr 10, 2017Updated 9 years ago
- A small wifi penetration testing tool-kit☆12Jul 21, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- ☆10Feb 20, 2026Updated 2 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.