☆10Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for CCPA-Docs
Users that are interested in CCPA-Docs are comparing it to the libraries listed below
Sorting:
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- gitbook!☆11Mar 6, 2019Updated 6 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Glossary of security terms☆12Jan 3, 2022Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- A technical blog about Kusto☆11Oct 31, 2025Updated 4 months ago
- This sample application demonstrates using the Microsoft Information Protection SDK .NET wrapper to label and read a label from a file.☆13May 7, 2025Updated 9 months ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Flask(python)+ AngularJS application to control multiple vagrant machines on a headless server.☆17Apr 28, 2016Updated 9 years ago
- ansible course☆13Sep 7, 2023Updated 2 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 3 months ago
- Sumé LMS is a powerful microservice based solution for e-learning.☆10Feb 21, 2021Updated 5 years ago
- My personal Maid rules, as an example or source of inspiration for your own. :)☆21Nov 5, 2013Updated 12 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- ACF's OPRE OPS product. Code name Unicorn.☆12Updated this week
- SLA Buddy: a helpful robot to help you meet Service Level Agreement in Slack☆10Apr 5, 2024Updated last year
- < 80 LOC Implementing Writer Pro's syntax control (with NSLinguisticTagger) that iA tried to patent☆106Dec 24, 2013Updated 12 years ago
- Live coding in Reveal.js☆17Aug 9, 2016Updated 9 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Adobe CEP extension for InDesign to use the Bookalope cloud services. You can download the extension from Adobe Exchange.☆16Apr 13, 2024Updated last year
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆25Jul 2, 2013Updated 12 years ago
- GitHub Stats is all about stars, forks, repos, followers and more☆12Dec 5, 2017Updated 8 years ago
- Command-line access to google translate and some other features☆26Dec 30, 2018Updated 7 years ago
- good sum up... i recommend printing and working with it nearby you☆13Nov 6, 2021Updated 4 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- ***MERGED: SEE README:*** The XCCDF to InSpec parser scans and extracts the controls defined in the DISA XCCDF STIG XML documents and con…☆12Nov 23, 2018Updated 7 years ago
- Locust.io Awesomeness is here☆13Oct 11, 2017Updated 8 years ago
- A hubot script that explains the rules☆15Feb 14, 2026Updated 2 weeks ago
- ☆10Jul 7, 2022Updated 3 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 13 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- ☆14Mar 11, 2022Updated 3 years ago
- A Javascript computer algebra system that graphs and differentiates☆20Apr 30, 2015Updated 10 years ago
- Generative Adversarial Networks Projects, published by Packt☆15Oct 5, 2019Updated 6 years ago