A resource monitor that records resource usage (e.g., CPU usage, RAM usage and free, disk I/O count, NIC speed, etc.) and outputs the data in CSV format that is easy to post-process.
☆20Jan 11, 2017Updated 9 years ago
Alternatives and similar repositories for python-resmon
Users that are interested in python-resmon are comparing it to the libraries listed below
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- 🦋 verify http://shaparak.ir gateways and protect users against phishing attacks.☆13Nov 21, 2018Updated 7 years ago
- SharedVault is a small application that allows you to define a secret that will require multiple people to unlock.☆13Apr 29, 2021Updated 4 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- simple command line utility to clean my mac☆10May 4, 2016Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- A friendly orchestrator platform from the future☆17Updated this week
- Build Your Own Redis with Go☆13Sep 19, 2023Updated 2 years ago
- Darsnameh Course Files☆21Feb 6, 2021Updated 5 years ago
- Create a malicious pip package (PoC)☆12Sep 14, 2023Updated 2 years ago
- Vault of Windows Registry forensic artifacts☆28Nov 12, 2025Updated 4 months ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- Windows Forensics Salt States☆21Mar 11, 2026Updated last week
- Incident Response automation scripts☆16Sep 5, 2025Updated 6 months ago
- ☆17Sep 9, 2020Updated 5 years ago
- Get country code of IPv4/IPv6 address. Address lookup is done offline.☆19Jul 30, 2024Updated last year
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- virt-install script with RHEL kickstart and Debian preseed☆17Jun 29, 2021Updated 4 years ago
- [DEPRECATED] You should use web3.py instead.☆10Nov 24, 2016Updated 9 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- High performance time ordered PCAP merging utility☆23Jun 20, 2022Updated 3 years ago
- SublimeText 3 plugin for displaying regular expression explanations☆12Apr 23, 2018Updated 7 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- ruby library and executable to (de)crypt various router/switch password (IOS, NXOS, JunOS)☆18Oct 4, 2023Updated 2 years ago
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Jun 7, 2021Updated 4 years ago