Axosoft / glo-action-move-card
GitHub action to move Glo Boards cards to a column
☆12Updated last year
Alternatives and similar repositories for glo-action-move-card:
Users that are interested in glo-action-move-card are comparing it to the libraries listed below
- GitHub action to download and install Xanitizer, and to run a Xanitizer security analysis in a GitHub workflow.☆10Updated 4 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Updated last year
- Test websites monitor (see Baseline Requirements section 2.2)☆13Updated 8 months ago
- Setup the .npmrc file for azure devops☆22Updated 2 years ago
- Go wrapper for awslabs/certlint☆25Updated 5 years ago
- The mitmproxy website, https://mitmproxy.org/.☆17Updated 3 months ago
- Get your secret from blizzard. For use with authenticators☆21Updated 10 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 3 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 3 years ago
- A GitHub Action to run a Sophos Factory pipeline.☆13Updated last year
- Code and scripts used to automate delivery of tool packages used in virtual-environments.☆22Updated 3 years ago
- Open source cookbooks used by the login.gov team☆10Updated 3 months ago
- Native Node bindings to Git.☆17Updated 3 years ago
- SSL wrapper for socket objects (2.3, 2.4, 2.5 compatible)☆12Updated 4 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 2 years ago
- A build automation tool for MacPorts’ Buildbot setup☆23Updated last week
- Cost-Optimization, Backup & Security Alerting for the AWS Cloud with Terraform templates living in your repository☆17Updated 5 years ago
- Yubico OS X libccid patcher☆9Updated 9 years ago
- Interface for the Shodan Computer Search Engine API☆24Updated 4 years ago
- A bot to manage the ohmyzsh project☆35Updated this week
- The Java-based SDK for the Open Threat Exchange API.☆34Updated last year
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆16Updated last month
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated last year
- ☆13Updated 4 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago
- The libssh2.org web site contents☆20Updated 6 months ago
- Verify ownership of domains and mobile apps☆23Updated last year
- Web based administration tool for Yubico software components including YK-VAL, YK-KSM and rlm_yubikey☆12Updated 6 years ago
- ☆9Updated 3 years ago