Vagrant Box Packaging for Ubuntu
☆33Mar 6, 2026Updated this week
Alternatives and similar repositories for vagrant-ubuntu
Users that are interested in vagrant-ubuntu are comparing it to the libraries listed below
Sorting:
- Использование инструмента Draw.io для создания схем Terraform развертываний.☆10Dec 18, 2025Updated 2 months ago
- ☆10Jan 21, 2026Updated last month
- Use the Edge Diagnostics CLI to identify, analyze, and troubleshoot common content delivery network issues that your users may encounter.☆14Oct 12, 2022Updated 3 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Example of three basic modules written for Ansible in Python☆10Jun 15, 2019Updated 6 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆10Dec 11, 2023Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- ansible role redis (cluster and standalone mode)☆13Nov 2, 2019Updated 6 years ago
- Configure sysctl on your system.☆17Dec 17, 2025Updated 2 months ago
- Go library to shutdown your goroutines gracefully and in a timely manner☆13Feb 27, 2023Updated 3 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- ☆12Sep 18, 2015Updated 10 years ago
- Trino On K8S Via Helm & Metastore Workshop Querying Delta Tables☆12Jan 27, 2025Updated last year
- Ansible role to manage (security)limits in Debian-like systems☆10Nov 2, 2023Updated 2 years ago
- Data Lake Engine☆13Dec 10, 2021Updated 4 years ago
- Terraform module to manage Compute Instance resources within the Yandex.Cloud.☆13Mar 2, 2026Updated last week
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago
- ☆10Jun 26, 2024Updated last year
- ☆14May 5, 2020Updated 5 years ago
- Automatic Query Caching with ProxySQL and Readyset☆12Jun 2, 2025Updated 9 months ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Pentest Console - Manage the pentest process with ease. [DEPRECATED]☆18Jan 8, 2012Updated 14 years ago
- Dockerfile to building Docker image for Apache Kafka☆11Oct 14, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- A fast way to reach commonly used operation☆10Feb 6, 2018Updated 8 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- Example Porter bundles☆14Oct 13, 2025Updated 4 months ago
- EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案☆13Nov 25, 2022Updated 3 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- ☆15Oct 29, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago