Working files for the Docker and Kubernetes course from Udemy taught by Stephen Grider (StephenGrider)
☆13Jan 25, 2023Updated 3 years ago
Alternatives and similar repositories for docker-kubernetes-udemy
Users that are interested in docker-kubernetes-udemy are comparing it to the libraries listed below
Sorting:
- ☆19Jun 21, 2025Updated 8 months ago
- Colt Steele Udemy Course☆25Nov 20, 2018Updated 7 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- Poderosas herramienta de phishing☆10Updated this week
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- Data files and scripts for the ASU PHY494 class. Will be updated as we go along.☆10Jan 6, 2022Updated 4 years ago
- Cpp Socket Programming Tutorial☆10Jun 9, 2021Updated 4 years ago
- deployment-course-udemy☆12Jul 17, 2021Updated 4 years ago
- This contain the source course for Spring Boot : Complete guide from development to deployment☆14Feb 14, 2019Updated 7 years ago
- ☆18Updated this week
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- a simple operating system☆10May 10, 2015Updated 10 years ago
- Materials accompanying the upstrap paper☆12Oct 19, 2020Updated 5 years ago
- Angular Personal Resume And Portfolio Template☆11Updated this week
- In-memory key-value store for testing applications against weak behaviors of a database.☆11Feb 4, 2021Updated 5 years ago
- ☆12Jul 21, 2022Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆10Sep 15, 2018Updated 7 years ago
- A step-by-step guide that shows how to do text classification by run training/inference for a custom model in Amazon SageMaker☆11May 21, 2019Updated 6 years ago
- A hands on tutorial for the Scuttleverse☆14Feb 12, 2017Updated 9 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- ☆14May 1, 2018Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Mastering Apache Camel by Packt Publishing☆13Apr 14, 2023Updated 2 years ago
- Computer Vision in Python course☆16Feb 11, 2023Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ☆12Sep 26, 2020Updated 5 years ago
- a simple log rotator written in bash☆12Dec 7, 2015Updated 10 years ago
- ☆13Jul 13, 2019Updated 6 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Excel Add-in samples and using macro in add-in☆10Dec 12, 2023Updated 2 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- create a custom iso of debian☆11May 18, 2022Updated 3 years ago
- Simple Webserver Implementation using Sockets☆15Dec 8, 2022Updated 3 years ago