The invoicer for Chapter 2 of Securing DevOps
☆48Jan 6, 2026Updated last month
Alternatives and similar repositories for invoicer-chapter2
Users that are interested in invoicer-chapter2 are comparing it to the libraries listed below
Sorting:
- Securing DevOps' logging pipeline, a dev environment for Mozilla Hindsight☆22Jul 6, 2018Updated 7 years ago
- The invoicer☆18Mar 1, 2023Updated 3 years ago
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Apr 14, 2020Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Feb 13, 2026Updated 2 weeks ago
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆21Jan 3, 2023Updated 3 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Example Code along with the blog post at https://blokje5/dev☆24Jul 21, 2019Updated 6 years ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆20Aug 6, 2025Updated 6 months ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- An insecure example application (Java)☆33Aug 19, 2025Updated 6 months ago
- ☆39Jan 10, 2019Updated 7 years ago
- ☆16Feb 19, 2026Updated last week
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆17Jul 26, 2025Updated 7 months ago
- ☆11Jul 23, 2024Updated last year
- ☆10Oct 9, 2024Updated last year
- ☆11Oct 14, 2020Updated 5 years ago
- ☆29May 29, 2025Updated 9 months ago
- ☆18May 11, 2021Updated 4 years ago
- just a bunch of vulnerable web pages for demo☆11Jun 6, 2019Updated 6 years ago
- Act as part of the business code and will report aqua scan report after application installed☆17Nov 11, 2021Updated 4 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- Introduction to deep learning w/ keras☆11Feb 18, 2022Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Desk Mate, a microservices-based Help Desk Software powered by MERN stack and Tailwind CSS, streamlines support with a robust ticketing s…☆11Aug 10, 2024Updated last year
- Notes on "Data Science from Scratch" by Joel Grus☆11Aug 9, 2016Updated 9 years ago
- Kubernetes on AWS Workshop☆10Nov 3, 2017Updated 8 years ago
- Sakai is a freely available, feature-rich technology solution for learning, teaching, research and collaboration. Sakai is an open source…☆11Updated this week
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆17Jan 24, 2024Updated 2 years ago
- An Internet Relay Chat server in C++ 98☆11May 20, 2022Updated 3 years ago
- Terraform provider for Salesforce☆10Jul 16, 2018Updated 7 years ago
- A gym-esque environment for Super Smash Bros. Melee.☆12Aug 13, 2021Updated 4 years ago
- Fresh HQ Combo List For Cracking☆10Sep 13, 2021Updated 4 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago