G.E.N.E.S.I.S. / Codex

The Codex

A grimoire of asymmetric leverage. Tools, frameworks, and mechanisms that grant an individual more power than they should reasonably have. No noise. No filler. Pure signal.

172Total
38Offense
39Defense
95Scouting

Domain

Vector

Taxonomy

172 entries indexed
I001
SCOUTING

QS Access

Digital Sorcery

Software Architecture

A tool for unlocking data from the Apple Health "walled garden." It exports health metrics as CSV files, providing the raw data required for sovereign biometric warehousing.

I002
SCOUTING

Dogsheep / Datasette

Digital Sorcery

Software Architecture

A suite of tools for retrieving and exploring personal data via SQLite. It enables the operative to perform complex SQL-based "n=1" experiments to identify lags between biochemical interventions and physiological outcomes.

I003
SCOUTING

HPI (Human Programming Interface)

Digital Sorcery

Software Architecture

A Python-based framework for unifying all life-data. It parses local JSON, SQLite, and org-mode files into a programmatic interface, allowing for the cross-referencing of environmental quality with neural performance.

I004
SCOUTING

neurokinetikz/schumann (FOOOF)

Digital Sorcery

Psychology & Social DynamicsSoftware Architecture

A detection algorithm for "Schumann Ignition Events"—transient moments of multi-band neural coherence. It uses FOOOF (Fitting Oscillations & One-Over-F) to identify real-time cross-frequency coherence signatures of the flow state.

I005
OFFENSE

BrainFlow

Digital Sorcery

Software Architecture

A cross-platform library for parsing and analyzing raw neural data. It supports all major BCI hardware, providing a uniform API for real-time signal processing, denoising, and ML-based feature extraction.

I006
SCOUTING

LabStreamingLayer (LSL)

Digital Sorcery

Software Architecture

The primary protocol for unified time-series data streaming. It synchronizes data from multiple BCI and biometric sensors over a network, enabling complex multi-modal neurofeedback experiments.

I007
SCOUTING

OpenBCI Ganglion

Digital Sorcery

Hardware & Embedded SystemsSoftware Architecture

A 4-channel, low-cost BCI platform designed for high-precision EMG and EEG. Used for entry-level neuro-interfacing and localized biopotential interrogation.

I008
SCOUTING

OpenBCI Cyton

Digital Sorcery

Hardware & Embedded SystemsSoftware Architecture

An open-source biosensing board equipped with the ADS1299 chip. It provides 24-bit resolution across 8-16 channels of EEG, EMG, and ECG. The foundation for custom-built neurofeedback loops and motor imagery decoding.

I009
SCOUTING

Mentalab Portable EEG

Digital Sorcery

Hardware & Embedded SystemsSoftware Architecture

A high-end, mobile EEG system supporting up to 32 channels. It integrates with LabStreamingLayer (LSL) for real-time neural data interrogation and 9-axis motion tracking, bridging the gap between lab research and field operations.

I010
SCOUTING

xDrip+ / xDrip4iOS

Digital Sorcery

Software Architecture

Open-source data uploaders and aggregators. They pull raw data from CGM sensors via Bluetooth and sync to local SQLite databases or Nightscout instances, providing a programmatic interface for metabolic interrogation.

I011
DEFENSE

Nightscout (CGM in the Cloud)

Digital Sorcery

Security & Risk ManagementSoftware Architecture

An open-source, DIY cloud application that acts as a central repository for biometric data. It allows the operative to bypass proprietary "black box" ecosystems, ensuring absolute raw data autonomy and sovereignty over metabolic logs.

I012
SCOUTING

Instrumentl

Digital Sorcery

Software ArchitectureCapital Allocation

An AI-powered grant prospecting platform. It uses semantic search to match projects with federal, state, and private funding sources, automating the discovery of institutional capital.

I013
OFFENSE

Chainlink CCIP

Digital Sorcery

Software ArchitectureMacro-Economics

The enterprise standard for cross-chain communication. It provides a secure, oracle-based rail for bank-to-bank tokenized asset movement and institutional capital flows.

I014
OFFENSE

LayerZero

Digital Sorcery

Software ArchitectureDecentralized Finance

An omnichain interoperability protocol. It facilitates the movement of stablecoins and tokenized assets across 165+ blockchains. Integrated with the institutional "Canton" network for TradFi-to-DeFi arbitrage.

I016
OFFENSE

Firstbase.io

Digital Sorcery

International & Corporate LawCapital Allocation

The primary tool for international founders seeking to access US banking and venture capital. It automates incorporation in Delaware and Wyoming, EIN acquisition, and compliance via a centralized SaaS interface.

I017
OFFENSE

Sleek

Digital Sorcery

International & Corporate LawArbitrage & Trade

A "one-stop-shop" for entity formation in Singapore, Hong Kong, and Australia. It automates bookkeeping, tax filing, and nominee director services, allowing operatives to maintain "Economic Substance" with minimal administrative friction.

I018
OFFENSE

Otonomos

Digital Sorcery

International & Corporate LawSoftware Architecture

A legal-tech platform for deploying "entity stacks." It automates the formation and maintenance of companies in the Cayman Islands, BVI, Wyoming, and Seychelles. Features a digital dashboard for managing cap tables, resolutions, and DAO governance.

I019
DEFENSE

SoloKeys

Digital Sorcery

Hardware & Embedded Systems

Open-source FIDO2 security keys. Being community-driven and fully hackable, they provide a transparent alternative to proprietary "black box" security tokens.

I020
DEFENSE

Librem Key

Digital Sorcery

Cyber-Security

A cryptographic token uniquely integrated with the PureBoot firmware. It flashes a physical LED to notify the user if the BIOS has been tampered with, establishing a hardware-verified root of trust for the entire system.

I021
DEFENSE

Nitrokey 3C

Digital Sorcery

Cyber-SecurityHardware & Embedded Systems

An open-source hardware security token with an upgradable secure enclave. Supports FIDO2, U2F, and OpenPGP, providing a physically isolated environment for the storage of master cryptographic secrets.

I022
DEFENSE

USB Armory

Digital Sorcery

Hardware & Embedded Systems

A full computer on a USB stick. It acts as a trusted execution environment for running secure operating systems or password managers in physical isolation from the host machine, preventing keylogging and malware extraction.

I023
DEFENSE

Zenarmor (OPNsense)

Digital Sorcery

Cyber-Security

A Layer 7 firewall plugin providing Deep Packet Inspection (DPI). It enables application-level control, allowing the operative to block behavioral patterns—such as smart TV screen-grabs or hardcoded app telemetry—that bypass standard DNS filtering.

I024
DEFENSE

HaGeZi Blocklists

Digital Sorcery

Cyber-SecuritySecurity & Risk Management

The most aggressive professional-grade DNS blocklists. Specifically targets OS-level native trackers, Newly Registered Domains (NRDs), and DGA endpoints to sanitize the network environment of surveillance telemetry.

I025
DEFENSE

NextDNS / Pi-hole

Digital Sorcery

Cyber-SecurityPsychology & Social Dynamics

DNS-level "sinkholes" that intercept telemetry and tracking requests at the network gateway. These serve as a cognitive quarantine, preventing algorithmic harvesting engines from building predictive models of user behavior.

I026
DEFENSE

SMS4Sats

Digital Sorcery

OSINT & AnalysisArbitrage & Trade

A service for obtaining private virtual numbers for SMS verification. Transactions are settled over the Lightning Network, enabling the creation of burner accounts without tethering them to a permanent physical identity.

I027
DEFENSE

macchanger

Digital Sorcery

Cyber-SecurityOSINT & Analysis

A utility for the systematic randomization of Media Access Control (MAC) addresses. Essential for preventing hardware-level tracking across disparate Wi-Fi networks and access points.

I028
DEFENSE

Hardened Malloc

Digital Sorcery

Cyber-Security

A security-focused memory allocator designed to mitigate memory corruption exploits (buffer overflows, heap spraying, use-after-free). It isolates metadata and utilizes guard pages, rendering entire classes of zero-day exploits non-viable.

I029
DEFENSE

Heads / PureBoot

Digital Sorcery

Cyber-Security

An open-source bootloader and security suite. When combined with a physical security token, it cryptographically verifies the integrity of the BIOS and kernel, protecting the operative against "Evil Maid" attacks and firmware interdiction.

I030
DEFENSE

NovaCustom (Dasharo/Coreboot)

Digital Sorcery

Hardware & Embedded Systems

Laptops utilizing open-source firmware (Coreboot/Dasharo) to replace proprietary BIOS/UEFI blobs. This eliminates opaque vendor backdoors and provides a verifiable root of trust from the first bit of code executed.

I031
DEFENSE

Ramsey STE3000F3

Digital Sorcery

Hardware & Embedded Systems

A high-isolation forensic workstation providing >85dB attenuation at 2.4GHz. It decouples devices entirely from the electromagnetic substrate, allowing for the sterile extraction of data in a shielded environment.

I032
DEFENSE

Mission Darkness BlockBox Lab XL

Digital Sorcery

Cyber-Security

A forensic-grade faraday chamber. It allows for live device interrogation through RF-tight conductive gloves and a viewing window. Used to analyze suspect devices or perform sensitive operations without risk of remote "kill" signals or cloud synchronization.

I033
DEFENSE

GoDark Faraday Bags

Digital Sorcery

Security & Risk Management

Professional-grade RF shielding enclosures. Utilizing a 3-layer signal-blocking design, they provide high attenuation against 5G, Wi-Fi, Bluetooth, and GPS. Essential for physical-layer isolation of mobile beacons to prevent persistent geolocation and remote i...

I034
OFFENSE

Anti-Captcha

Digital Sorcery

Software Architecture

A reliable hybrid (Human/AI) solver service known for its consistency and broad protocol support. It is the legacy choice for high-volume automated research pipelines.

I035
OFFENSE

CapMonster Cloud

Digital Sorcery

Software Architecture

An ultra-high-speed AI/ML engine for CAPTCHA solving. It supports over 10,000 solves per minute with sub-second response times for image-based challenges.

I036
OFFENSE

2Captcha

Digital Sorcery

Software Architecture

A human-in-the-loop CAPTCHA solver. While slower than AI solutions, it provides the broadest coverage for complex or novel puzzles that require human intelligence to resolve.

I037
OFFENSE

CapSolver

Digital Sorcery

Cyber-SecuritySoftware Architecture

An AI-powered challenge solver. It resolves Cloudflare Turnstile, hCaptcha, and reCAPTCHA in <10 seconds without human workers, enabling the high-throughput execution of automated agents.

I038
SCOUTING

Pathway

Digital Sorcery

Software ArchitectureMacro-Economics

A real-time data synchronization engine for RAG. It is optimized for frequently changing knowledge bases, such as live news feeds or system logs, allowing for instantaneous re-indexing.

I039
SCOUTING

RAGFlow

Digital Sorcery

Heavy EngineeringSoftware Architecture

An enterprise-grade engine focused on "Deep Document Understanding." It excels at parsing complex PDFs and tables, preserving the structural integrity of institutional data during indexing.

I040
OFFENSE

text-generation-webui

Digital Sorcery

Psychology & Social DynamicsSoftware Architecture

A comprehensive local interface for model tuning. It provides deep control over quantization and sampling, making it ideal for testing uncensored model behavior.

I041
OFFENSE

vLLM

Digital Sorcery

Software Architecture

A high-performance inference engine using "PagedAttention." It is built for production environments where multiple agents need to query a model simultaneously without causing latency spikes.

I042
OFFENSE

n8n

Digital Sorcery

Art & Cultural EngineeringSoftware Architecture

A self-hostable visual workflow engine with 400+ pre-built integrations. It serves as the "front-end" of the automation stack, connecting disparate SaaS APIs and handling initial data routing.

I043
DEFENSE

Temporal

Digital Sorcery

Security & Risk ManagementSoftware Architecture

The standard for durable execution. It maintains a full event history, ensuring that multi-stage workflows complete even if the underlying infrastructure crashes. Essential for mission-critical financial or operational pipelines.

I044
OFFENSE

Windmill

Digital Sorcery

Software ArchitectureCapital Allocation

A high-speed "Workflows-as-Code" platform. It supports Python, TypeScript, and Go, allowing for the creation of complex, suspendable logic. It is optimized for high concurrency, releasing system resources entirely between tasks.

I045
OFFENSE

AWS Lambda

Digital Sorcery

Software Architecture

A versatile serverless environment supporting complex, long-running (up to 15m) execution tasks. When combined with a "Fanout" pattern, it acts as a distributed supercomputer for institutional-scale processing.

I046
OFFENSE

Cloudflare Workers

Digital Sorcery

Software Architecture

A mass-deployment platform running on V8 "isolates." It eliminates cold-starts, allowing an operative to spin up thousands of ephemeral execution nodes in milliseconds. This is the apex of distributed edge computing.

I047
OFFENSE

PlainProxies

Digital Sorcery

Software Architecture

Provides unlimited bandwidth residential proxies. It is designed for massive, high-throughput data extraction where data consumption would otherwise be cost-prohibitive.

I048
DEFENSE

Nstbrowser

Digital Sorcery

Security & Risk ManagementSoftware Architecture

An anti-detect browser designed for multi-account isolation and fingerprint management. It utilizes advanced isolation techniques to ensure that every session appears as a unique, legitimate user across the global digital substrate.

I049
OFFENSE

chromedp

Digital Sorcery

Software Architecture

A Go-native implementation of the Chrome DevTools Protocol. It offers extreme performance for high-concurrency scraping and automation without the overhead of Node.js or external driver binaries.

I050
OFFENSE

Camoufox

Digital Sorcery

Cyber-SecuritySoftware Architecture

A hardened Firefox engine patched at the C++ level. It spoofs hardware reports (Canvas, WebGL, AudioContext) at the engine level rather than via JavaScript, ensuring that hardware fingerprints are indistinguishable from real human-operated devices.

I051
OFFENSE

Nodriver

Digital Sorcery

Cyber-SecuritySoftware Architecture

The successor to undetected-chromedriver. It eliminates the "WebDriver" signature entirely by communicating directly via the Chrome DevTools Protocol (CDP). Because it does not use a driver binary, it is virtually undetectable to Web Application Firewalls (WAF...

I052
OFFENSE

Puppeteer

Digital Sorcery

Software Architecture

A high-performance Node.js library for Chromium control. It is the industry standard for heavy-lifting automation tasks. Like Playwright, its "WebDriver" markers must be obfuscated to maintain operational stealth.

I053
OFFENSE

Playwright

Digital Sorcery

Software Architecture

A framework for institutional-scale web automation across Chromium, Firefox, and WebKit. It enables granular control over network mocking, mobile emulation, and geolocation. While robust, it requires stealth plugins to bypass enterprise-grade bot detection (Cl...

I054
SCOUTING

Volatility

Digital Sorcery

Cyber-Security

An advanced memory forensics framework. It analyzes RAM to uncover hidden malware, active network connections, and recently executed commands that leave no trace on the physical disk.

I055
SCOUTING

Wireshark

Digital Sorcery

Cyber-Security

The world's foremost network protocol analyzer. It allows for the deep-dive examination of network traffic at a microscopic level, identifying malicious activity and unauthorized data transmissions.

I056
SCOUTING

Maltego

Digital Sorcery

OSINT & Analysis

The ultimate link analysis tool. It visualizes the connections between people, domains, companies, and IP addresses, turning disparate data points into an interactive map of hidden relationships.

I057
SCOUTING

Autopsy

Digital Sorcery

Cyber-Security

The premier open-source digital forensics platform. It provides a graphical interface for disk image analysis, file recovery, and keyword searching, matching the capability of commercial forensic suites.

I058
SCOUTING

Magnet AXIOM

Digital Sorcery

Cyber-Security

An elite digital forensics platform. It uses an "artifact-first" approach to recover deleted or hidden evidence from mobile devices, cloud storage, and computers in a single integrated case file.

I059
SCOUTING

Telegago

Digital Sorcery

Psychology & Social Dynamics

A specialized search engine for Telegram channels. It allows for the monitoring of trends in private chats and the tracking of groups otherwise obscured by Telegram's encryption and social structure.

I060
SCOUTING

GHunt

Digital Sorcery

OSINT & Analysis

An OSINT tool that extracts information from any Google Account using only an email address. It uncovers connected services, public photos, and the physical locations of a target.

I061
SCOUTING

FotoForensics

Digital Sorcery

Art & Cultural Engineering

Provides Error Level Analysis (ELA) and hidden EXIF extraction for digital images. It identifies manipulated regions in photographs, piercing the veil of visual deception.

I062
DEFENSE

Mat2

Digital Sorcery

Cyber-Security

A forensic-grade tool for cleaning metadata from files. Essential for operatives to sterilize documents before publication or transmission to protect sources and operational security.

I063
SCOUTING

Metagoofil

Digital Sorcery

OSINT & Analysis

Uses "Google Dorks" to find and download specific file types from a target domain for metadata analysis. A high-efficiency offensive reconnaissance tool.

I064
SCOUTING

FOCA

Digital Sorcery

OSINT & Analysis

Fingerprints organizations by extracting metadata from publicly available documents (PDF, Word, etc.). It reveals internal usernames, software versions, and server paths, mapping an organization's internal technical architecture from the outside.

I065
SCOUTING

ExifTool

Digital Sorcery

Cyber-Security

The definitive tool for reading, writing, and editing metadata in images, audio, and video files. It exposes the hidden technical residue left in files, including GPS coordinates and device fingerprints.

I066
SCOUTING

BinaryEdge

Digital Sorcery

Cyber-Security

Scans the internet for exposed assets such as MongoDB, Elasticsearch, and other unprotected database instances. Used for mapping attack surfaces and identifying data exposure.

I067
SCOUTING

Grayhat Warfare

Digital Sorcery

Cyber-Security

A specialized search engine for public cloud storage. It indexes files within publicly accessible Amazon S3 buckets, exposing internal company documents and sensitive backups.

I068
SCOUTING

LeakIX

Digital Sorcery

Cyber-Security

Scans the internet for misconfigured web servers and exposed databases. It provides real-time alerts on data leaks and public exposure of sensitive information.

I069
SCOUTING

ZoomEye

Digital Sorcery

Cyber-Security

A global cyberspace mapping engine. It scans for web services and IoT components, providing comprehensive target discovery for reconnaissance and red-teaming.

I070
SCOUTING

Censys

Digital Sorcery

Cyber-Security

An infrastructure search engine that focuses on SSL certificates and network configurations. It provides an "X-ray" of an organization's digital footprint and mismanaged network assets.

I071
SCOUTING

Shodan

Digital Sorcery

Cyber-Security

The search engine for the Internet of Things (IoT). It indexes connected devices, industrial control systems, and routers, exposing vulnerable infrastructure and unpatched servers globally.

I072
SCOUTING

Sentinel Hub

Digital Sorcery

Software Architecture

A cloud-based API for Earth Observation data. It enables on-the-fly processing of Sentinel imagery, allowing operatives to extract statistical data or generate custom visual indices (NDVI/NDWI) without downloading large files.

I073
SCOUTING

SkyWatch

Digital Sorcery

Software Architecture

A geospatial data hub that simplifies the acquisition of satellite imagery. It automates the tasking and delivery process for multispectral and SAR data across different constellations.

I074
SCOUTING

UP42

Digital Sorcery

Software Architecture

A unified geospatial marketplace and API. It provides access to multiple satellite providers (Airbus, Capella, Planet) through a single Python SDK, standardizing data into Cloud Optimized GeoTIFFs (COGs).

I075
SCOUTING

Planet SkySat

Digital Sorcery

Resource Extraction & Energy

Provides high-frequency monitoring with up to 7 revisits per day at 50 cm resolution. Ideal for monitoring operational activity at industrial sites and ports.

I076
SCOUTING

Airbus Pléiades Neo

Digital Sorcery

Security & Risk Management

Optical/Multispectral constellation offering 30 cm resolution with twice-daily revisit. Designed for rapid tasking in response to geopolitical crises or asset shifts.

I077
SCOUTING

Vantor (formerly Maxar)

Digital Sorcery

OSINT & Analysis

The industry standard for high-resolution optical imagery (15 cm). It maintains a massive historical archive back to 2007, allowing for deep chronological change detection at a tactical level.

I078
SCOUTING

Capella Space

Digital Sorcery

Hardware & Embedded Systems

Commercial SAR provider with 15-minute scheduling cycles. Its TCPED system allows for rapid tasking and delivery of 0.25 m resolution radar imagery for high-priority target monitoring.

I079
SCOUTING

ICEYE SAR Constellation

Digital Sorcery

Hardware & Embedded Systems

The vanguard of commercial Synthetic Aperture Radar (SAR). It provides sub-0.25 m resolution imagery through cloud cover, smoke, and total darkness, enabling 24/7 all-weather reconnaissance.

I080
SCOUTING

SRT FBO Scraper

Digital Sorcery

OSINT & Analysis

Uses machine learning to predict Federal IT procurement compliance. It scrapes SAM.gov solicitations and identifies opportunities based on federal accessibility standards.

I081
SCOUTING

Memorious

Digital Sorcery

Software Architecture

A lightweight web scraping toolkit for investigative data. It uses a modular stage system to crawl public records and structure them for cross-referencing against leaked datasets.

I082
OFFENSE

ExtracTED

Digital Sorcery

Software Architecture

Python scripts designed to extract and parse Contract Award Notices from the EU's Tenders Electronic Daily (TED). It converts XML packages into structured data for the analysis of EU procurement winners.

I083
SCOUTING

BlackSky

Digital Sorcery

OSINT & Analysis

A high-revisit satellite constellation providing 80 cm resolution imagery. It enables site-specific tactical monitoring with rapid revisit times, essential for capturing time-sensitive changes in infrastructure or asset movement.

I084
SCOUTING

Bedrock

Digital Sorcery

Logistics & Supply Chain

An automated platform for detecting "dark ship" activity. It combines AIS data with Radio Frequency (RF) signals and Synthetic Aperture Radar (SAR) to maintain visibility on non-cooperative maritime targets.

I085
SCOUTING

Global Fishing Watch

Digital Sorcery

Resource Extraction & Energy

Fuses AIS, VMS, and SAR data to track illegal fishing activity. It identifies "dark" vessels and environmental violations in global waters through transponder and radar fusion.

I086
SCOUTING

FlightRadar24

Digital Sorcery

Logistics & Supply Chain

The industry standard for commercial flight tracking. It provides high-fidelity data on civil aviation fleets, ideal for monitoring the operational health of global air logistics.

I087
SCOUTING

ADSBExchange

Digital Sorcery

OSINT & Analysis

The unfiltered source for aviation intelligence. Unlike commercial trackers, it does not honor privacy requests, allowing the operative to track military exercises, diplomatic flights, and private assets hidden from public view.

I088
SCOUTING

VesselFinder

Digital Sorcery

Logistics & Supply Chain

A high-fidelity alternative to MarineTraffic for real-time global vessel tracking and voyage history. Used to verify maritime signals and identify transit anomalies.

I089
SCOUTING

MarineTraffic

Digital Sorcery

Logistics & Supply Chain

The baseline for maritime situational awareness. Using AIS transponder data, it monitors global vessel movements, port congestion, and voyage forecasting. Vital for tracking the kinetic flow of physical commodities.

I090
SCOUTING

GODIN (Global Open Data Integration Network)

Digital Sorcery

Software Architecture

An emerging framework for aligning open data standards with the Beneficial Ownership Data Standard (BODS). It enables interoperability between diverse public datasets, facilitating the automated cross-referencing of registrations and real-world outcomes.

II096
SCOUTING

Zenobase

Cognitive Augmentation

OSINT & Analysis

A platform for aggregating and visualizing data from disparate biometric feeds. It provides the visual interface for the "Extended Exoself," turning raw biometric streams into actionable performance metrics.

II097
DEFENSE

i-sopod (Isolation Tank)

Cognitive Augmentation

Heavy EngineeringPsychology & Social Dynamics

A structural environment for sensory deprivation. It maintains thermal equilibrium and high buoyancy via 1,200 lbs of Epsom salt, eliminating musculoskeletal strain to facilitate deep recovery and extreme meditative states.

II098
OFFENSE

Noopept

Cognitive Augmentation

Psychology & Social Dynamics

A high-potency piracetam analog. It acts via a peptidergic mechanism to stimulate NGF and BDNF synthesis in the hippocampus, enhancing memory encoding and providing neuroprotection against cognitive decay.

II099
DEFENSE

Cerebrolysin

Cognitive Augmentation

Biological & Medical SciencesEducation & Pedagogy

A neurotrophic agent derived from porcine brain peptides. It crosses the blood-brain barrier to provide neuroprotection, anti-inflammatory effects, and memory enhancement by mimicking endogenous factors like BDNF.

II100
DEFENSE

BPC-157

Cognitive Augmentation

Biological & Medical Sciences

A synthetic pentadecapeptide derived from human gastric juice. It triggers angiogenesis via the VEGFR2 pathway, promoting systemic repair of tendons, ligaments, and the gastrointestinal tract. A primary compound for physical recovery.

II101
SCOUTING

Peptipedia v2.0

Cognitive Augmentation

Biological & Medical SciencesOSINT & Analysis

A peptide sequence database incorporating machine learning for functional classification. Used to discover novel functional peptides and evaluate their physicochemical properties for somatic enhancement.

II102
SCOUTING

THPdb

Cognitive Augmentation

Biological & Medical Sciences

A comprehensive database of FDA-approved therapeutic peptides and proteins. Provides high-fidelity data on pharmacokinetic profiles, clearance rates, and toxicity, essential for modeling biochemical interventions.

II103
SCOUTING

MNE-Python

Cognitive Augmentation

OSINT & AnalysisSoftware Architecture

A comprehensive open-source Python package for exploring, visualizing, and analyzing human neurophysiological data. Essential for mapping the "noetic topography" of the brain through spectral analysis and source localization.

II104
SCOUTING

BrainBit

Cognitive Augmentation

Hardware & Embedded Systems

A 4-channel dry-electrode EEG headband. Optimized for monitoring frontal and temporal regions, providing a streamlined interface for real-time concentration and relaxation tracking.

II105
SCOUTING

Emotiv Epoc X

Cognitive Augmentation

Psychology & Social DynamicsSoftware Architecture

A 14-channel mobile BCI utilizing saline-based sensors. It is designed for rapid deployment in affective AI projects, capturing neural signatures of emotional arousal and mental load.

II106
SCOUTING

Dreem 3

Cognitive Augmentation

Biological & Medical Sciences

A wearable sleep-staging system providing multi-channel EEG and respiration data. It uses automated scoring to assess sleep architecture, facilitating the optimization of N3 and REM cycles for neural recovery.

II107
SCOUTING

Hypnodyne Zmax

Cognitive Augmentation

Psychology & Social DynamicsSoftware Architecture

A research-grade sleep-monitoring headband. It provides 256Hz raw EEG data, gel-electrode precision, and tri-axial accelerometry. It is highly programmable via JavaScript, enabling Targeted Memory Reactivation (TMR) and automated REM-triggered protocols.

II108
SCOUTING

CorTemp Pill (HQ Inc.)

Cognitive Augmentation

Biological & Medical SciencesHardware & Embedded Systems

A research-grade telemetric pill for continuous internal temperature monitoring. It allows for the precision tracking of thermal dynamics close to the central circulation, bypassing the noise of skin-based sensors.

II109
SCOUTING

CORE Sensor

Cognitive Augmentation

Biological & Medical SciencesHardware & Embedded Systems

A wearable sensor that measures thermal energy transfer to estimate core body temperature non-invasively. Used to design personalized cooling protocols and protect metabolic pathways during high-intensity cognitive output.

II110
SCOUTING

eCelsius Performance (BodyCAP)

Cognitive Augmentation

Biological & Medical SciencesHardware & Embedded Systems

An ingestible telemetric pill for the interrogation of core body temperature (CBT). It transmits internal thermal data via 433MHz RF, providing medical-grade accuracy essential for identifying mitochondrial efficiency and circadian peaks.

II111
SCOUTING

Freestyle Libre 3

Cognitive Augmentation

Biological & Medical Sciences

A high-precision metabolic sensor utilizing NFC and Bluetooth for continuous glucose tracking. Used to monitor the "glucose-to-performance" ratio and optimize the metabolic substrate for deep-work states.

II112
SCOUTING

Dexcom G7 / Stelo

Cognitive Augmentation

Biological & Medical Sciences

Professional-grade hardware for Continuous Glucose Monitoring (CGM). It provides real-time interstitial glucose data, allowing the operative to identify glycemic variability. Vital for correlating nutritional inputs with cognitive endurance and preventing neur...

II114
SCOUTING

ForeignAssistance.gov

Cognitive Augmentation

Public Policy & DiplomacyMacro-Economics

Tracks the entire lifecycle of U.S. foreign aid. Operatives use this to monitor obligations and disbursements, identifying "active project datasets" and infrastructure surges in emerging markets.

II117
SCOUTING

OECD Corporate Tax Statistics

Cognitive Augmentation

International & Corporate LawMacro-Economics

A critical database for R&D arbitrage. It tracks effective tax rates and innovation incentives across 48 countries, identifying jurisdictions with the highest institutional support for technology deployment.

II119
SCOUTING

Global SWF Data Platform

Cognitive Augmentation

OSINT & AnalysisMacro-Economics

Focuses on State-Owned Investors. It tracks governance and strategic intent (GSR scores) of central banks and SWFs, providing real-time alerts on acquisitions and shifts in sovereign investment strategies.

II120
SCOUTING

SWFI Terminal

Cognitive Augmentation

OSINT & AnalysisMacro-Economics

The professional standard for tracking global institutional capital. Provides granular data on $15.8 trillion in assets, including Sovereign Wealth Funds, pensions, and family offices. Essential for identifying capital "honeypots" and strategic mandates.

II121
DEFENSE

Briar

Cognitive Augmentation

Security & Risk Management

A peer-to-peer (P2P) mesh messenger designed for crisis environments. It synchronizes data directly via Bluetooth, Wi-Fi, or Tor, ensuring communication remains viable even during total internet censorship or network blackouts.

II122
DEFENSE

Session

Cognitive Augmentation

OSINT & Analysis

A decentralized messenger that onion-routes all traffic through a node-based network. It requires no phone number or email, severing the link between the digital identity and the physical substrate.

II123
DEFENSE

SimpleX Chat

Cognitive Augmentation

OSINT & AnalysisSecurity & Risk Management

The first messaging platform with no globally unique user identifiers. It utilizes unidirectional message queues to eliminate the social graph at the protocol level, providing the highest level of metadata-resistant communication currently available.

II124
DEFENSE

Matrix (Synapse/Dendrite)

Cognitive Augmentation

Art & Cultural EngineeringOSINT & Analysis

A federated communication protocol that enables self-hosting of the social graph. By maintaining a private homeserver, an entity retains absolute ownership over communication logs and metadata, bypassing centralized surveillance.

II125
DEFENSE

Purism Librem 14

Cognitive Augmentation

Cyber-SecurityHardware & Embedded Systems

A security-first laptop designed to neutralize Ring -3 and Ring -2 subsystems (Intel Management Engine). Features hardware kill switches for camera, mic, and wireless modules, ensuring absolute hardware-level sovereignty.

II126
SCOUTING

Blockify / IdeaBlocks

Cognitive Augmentation

Education & PedagogySoftware Architecture

A data optimization layer that transforms unstructured data into context-complete "IdeaBlocks." It provides a 78x increase in RAG accuracy and a 40x reduction in data volume, ensuring semantic precision at scale.

II127
DEFENSE

PrivateGPT

Cognitive Augmentation

Security & Risk ManagementSoftware Architecture

A complete, air-gapped RAG stack. It allows for the processing of sensitive data without external transmission, ensuring cognitive sovereignty and data privacy.

II128
OFFENSE

Midnight Miqu (70B)

Cognitive Augmentation

Art & Cultural EngineeringPsychology & Social Dynamics

A high-parameter model with a stable personality. Used for complex roleplay and behavioral simulation to predict human response in adversarial environments.

II129
OFFENSE

Dolphin-Llama 3 (Uncensored)

Cognitive Augmentation

Psychology & Social DynamicsSecurity & Risk Management

An "abliterated" version of Llama 3 with zero guardrails. It is designed to follow all instructions regardless of intent, making it a critical asset for security research and red-teaming operations.

II130
OFFENSE

DeepSeek-V3.2

Cognitive Augmentation

Software ArchitectureMacro-Economics

A Mixture-of-Experts (MoE) model providing high-fidelity reasoning. It excels at complex mathematical and economic modeling, bridging the gap between small and large-scale AI.

II131
SCOUTING

Command R (v2)

Cognitive Augmentation

OSINT & AnalysisSoftware Architecture

A RAG-native model designed with built-in citation capabilities. It is the preferred model for ensuring accuracy and verifiability in large-scale document parsing missions.

II132
SCOUTING

Llama 4 Scout (8B - 70B)

Cognitive Augmentation

Education & PedagogyOSINT & Analysis

A high-context model optimized for deep research. It supports a 1M+ token context window, allowing for the ingestion of entire document libraries for institutional-scale analysis.

II133
SCOUTING

LM Studio

Cognitive Augmentation

Art & Cultural Engineering

A graphical interface for model discovery and experimentation. It allows the operative to test "abliterated" models and tune parameters for specific tactical prompts.

II134
SCOUTING

Image Whisperer

Cognitive Augmentation

Art & Cultural Engineering

An AI-detection framework that uses Google Vision and LLM analysis to verify the authenticity of images. It identifies signs of AI generation and alerts the operative to potential synthetic deception.

II135
SCOUTING

InVID

Cognitive Augmentation

Art & Cultural Engineering

A browser extension for the verification of social media images and videos. It provides fragmentation and reverse-image search tools to detect manipulation and confirm the "ground truth" of visual content.

II136
SCOUTING

Intelligence X

Cognitive Augmentation

OSINT & Analysis

A search engine for the deep and dark web. It indexes Tor/I2P content, historical breach data, and deactivated web pages, making it essential for uncovering leaked or hidden intelligence.

II138
SCOUTING

Sentinel-1 (C-band SAR)

Cognitive Augmentation

Heavy Engineering

Free, open-access SAR data from the ESA. While lower resolution (5 m - 20 m), it provides a consistent, global baseline for monitoring large-scale infrastructure and maritime movements without cost.

II139
SCOUTING

OCDS (Open Contracting Data Standard)

Cognitive Augmentation

Public Policy & Diplomacy

A global standard for transparency in public procurement. It defines a common data model for the entire contract lifecycle, enabling the identification of red flags like bid-rigging and corruption in government spending.

II140
DEFENSE

OpenSanctions

Cognitive Augmentation

International & Corporate Law

A real-time repository of sanctioned entities and persons of interest. It aggregates lists from global regulators, allowing operatives to screen for risk and ensure jurisdictional compliance before engaging in capital deployment.

II141
SCOUTING

RuPEP

Cognitive Augmentation

OSINT & Analysis

A specialized database tracking Politically Exposed Persons (PEPs) in Russia and Belarus. It maps the business associates and family connections of those wielding state power, providing a roadmap for sanctions evasion and corruption analysis.

II144
OFFENSE

Anki — Spaced Repetition Memory System

Cognitive Augmentation

Flashcard software implementing the SuperMemo SM-2 spaced repetition algorithm — which schedules reviews at the precise intervals that maximize long-term retention with minimum time investment. The compound interest of learning. Used by medical students to mem...

III145
OFFENSE

EigenLayer

Economic Leverage

Software ArchitectureDecentralized Finance

A "restaking" protocol. It allows capital to secure multiple decentralized networks simultaneously, maximizing yield potential and reducing capital fragmentation across the programmable substrate.

III146
OFFENSE

Aave (Flash Loans)

Economic Leverage

Arbitrage & TradeDecentralized Finance

A decentralized lending marketplace. Its "Flash Loan" primitive allows for uncollateralized loans that are borrowed and repaid within a single block. Essential for high-frequency arbitrage and capital-efficient operations without institutional intermediaries.

III147
OFFENSE

Lido (stETH)

Economic Leverage

Capital AllocationDecentralized Finance

A liquid staking protocol. It allows operatives to earn yield on staked assets (ETH/SOL) while receiving "stETH" tokens. These tokens can be used as collateral or for cross-border transfers, eliminating the opportunity cost of locked capital.

III150
DEFENSE

Nevis International Exempt Trust

Economic Leverage

International & Corporate LawMacro-Economics

A high-deterrent protection framework. Requires creditors to post a mandatory $100,000 cash bond before commencing any action against the trust. It also abolishes "Mareva injunctions," preventing the freezing of assets during legal disputes.

III151
DEFENSE

Cook Islands International Trust

Economic Leverage

International & Corporate LawMacro-Economics

The global gold standard for asset protection. The International Trusts Act 1984 creates a nearly "impossible" burden of proof for creditors. It features non-recognition of foreign judgments and a statutory 1–2 year fraudulent transfer window, making assets le...

III152
DEFENSE

Malta: Nomad Residence Permit

Economic Leverage

International & Corporate Law

An EU-gateway residency. It offers a 10% flat tax on local work and 0% on foreign income for non-residents. Ideal for maintaining mobility within the Schengen Area while optimizing tax drag.

III153
DEFENSE

UAE: Virtual Working Programme

Economic Leverage

Public Policy & DiplomacyArbitrage & Trade

A zero-personal-income-tax residency framework. It allows operatives to live in a global financial hub while maintaining 0% tax on all earnings. It is a primary tool for high-velocity wealth accumulation and integration with Middle Eastern capital rails.

III154
DEFENSE

Spain: Beckham Law (Special Tax Regime)

Economic Leverage

International & Corporate LawMacro-Economics

A powerful fiscal tool for EU-based operations. It allows foreign workers and digital nomads to be taxed as non-residents. Key advantage: 0% tax on foreign-sourced income and a flat 24% tax on local income for up to six years, shielding global assets from Spai...

III155
DEFENSE

PlasBit / SolCard

Economic Leverage

Arbitrage & TradeCapital Allocation

Offshore/Non-KYC crypto debit cards. These allow for the physical projection of capital (via virtual or physical cards) while maintaining jurisdictional distance from centralized financial regulators.

III156
DEFENSE

Bitrefill

Economic Leverage

Arbitrage & TradeCapital Allocation

A non-KYC financial gateway. It allows the conversion of cryptocurrency directly into real-world utility via gift cards and mobile top-ups for thousands of retailers, bypassing the traditional traceable banking system.

III157
DEFENSE

Silent.link

Economic Leverage

Security & Risk ManagementArbitrage & Trade

Anonymous roaming eSIM provider. Paid exclusively via Bitcoin Lightning Network, it provides global data without KYC or identity verification, preventing local carriers from triangulating or logging subscriber data.

III158
OFFENSE

IPRoyal

Economic Leverage

Arbitrage & Trade

A budget-focused residential proxy pool with 32M+ IPs. Ideal for high-volume operations where cost-efficiency and localized targeting (State/City) are primary requirements.

III159
SCOUTING

DoubleData

Economic Leverage

Public Policy & DiplomacyMacro-Economics

An ethically-sourced residential proxy network. It specializes in providing high-trust signals for global research and corporate intelligence, ensuring the operative remains untraceable.

III160
OFFENSE

Oxylabs

Economic Leverage

OSINT & AnalysisSoftware Architecture

A high-tier proxy network providing 100M+ residential IPs. It offers granular targeting by country, state, and city, essential for mission-critical scraping in regions with localized content.

III161
SCOUTING

Contracts Finder

Economic Leverage

Public Policy & Diplomacy

A Python script for scraping UK government awarded contracts via the Version 2 API. It provides structured access to the UK procurement landscape.

III162
SCOUTING

Open RFPs

Economic Leverage

Capital Allocation

Standardizes diverse U.S. state and local government Request for Proposal (RFP) listings into JSON format. Essential for identifying decentralized government contracting opportunities.

III163
OFFENSE

USAspending API

Economic Leverage

Capital Allocation

The programmatic gateway to all U.S. federal spending. It allows operatives to ingest and query every federal contract and grant, identifying fiscal flows and opportunities for capital arbitrage.

III164
SCOUTING

Cirium

Economic Leverage

Macro-Economics

Advanced aviation analytics. It provides deep data on fleet valuations, emissions, and schedules. Used to assess the long-term strategic shifts in aviation markets and airline operational stability.

III165
SCOUTING

Violation Tracker Global

Economic Leverage

Security & Risk Management

A comprehensive database of corporate misconduct. It correlates corporate structures with nearly 700,000 penalty records from 58+ countries, identifying historical fines, regulatory failures, and systemic non-compliance.

III166
SCOUTING

OpenCorporates

Economic Leverage

OSINT & Analysis

The largest open database of company data in existence. It links Legal Entity Identifiers (LEIs) to national registry IDs, providing a transparent cross-reference for millions of entities across hundreds of jurisdictions.

III167
SCOUTING

Spark Interfax

Economic Leverage

OSINT & Analysis

The definitive source for corporate records in Russia and the CIS. It provides the ground truth on ownership, court cases, and financial statements within the Russian Federation, serving as a critical node for intelligence despite geopolitical data throttling.

III168
SCOUTING

Wirescreen

Economic Leverage

OSINT & Analysis

The primary scalpel for dissecting Chinese corporate networks. It tracks state-owned entity (SOE) linkages and beneficial ownership within the PRC, providing specific flags for state involvement and regulatory risk.

III169
SCOUTING

Sayari

Economic Leverage

OSINT & Analysis

A commercial intelligence platform specialized in high-secrecy jurisdictions, specifically China, Brazil, MENA, and Africa. It aggregates hard-to-reach public records and trade data to uncover beneficial ownership structures where traditional Western databases...

III170
SCOUTING

GLEIF Global LEI Index

Economic Leverage

The Capital MatrixMacro-Economics

The backbone of the global financial machine. It utilizes 20-character alphanumeric codes to uniquely identify legal entities in financial transactions. Level 2 data allows the operative to map "who owns whom," revealing ultimate parent-subsidiary relationship...