Kubernetes website and documentation repo:
☆13Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for website
Users that are interested in website are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Dec 11, 2022Updated 3 years ago
- Marketplace of Kubernetes applications available for quick and easy installation in to Civo Kubernetes clusters☆15Jun 16, 2024Updated last year
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- ☆18Feb 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CNCF resource for students looking to get into the cloud native community☆42Aug 15, 2024Updated last year
- Production-Grade Container Scheduling and Management☆52Jul 26, 2023Updated 2 years ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- This is a ChatGPT clone, a simple web-based chat application built using HTML, CSS, and JavaScript. It mimics the conversational abilitie…☆11May 1, 2024Updated last year
- ☆96Aug 1, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- Kateyes for Kubernetes cluster☆12Nov 15, 2022Updated 3 years ago
- A multi-vendor Driving lessons booking web-app☆16Jul 10, 2024Updated last year
- This sample shows how to install an AKS cluster with the Istio service mesh add-on via Bicep.☆12Apr 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago
- A 2D physics engine programmed in C++ that makes use of verlet integration to implement simply physics☆10Oct 26, 2025Updated 5 months ago
- ☆13Nov 29, 2024Updated last year
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 3 months ago
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated 2 years ago
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- ☆17Mar 6, 2022Updated 4 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- Universal prompt for Power users 💪🌈☆23May 14, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- ☆27Aug 1, 2025Updated 8 months ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated last month
- Straight port of fish-shell's Python manpage completion script to Rust☆23Jan 22, 2024Updated 2 years ago
- An end-to-end chip authentication architecture based on SRAM PUF and public key cryptography.☆17Nov 22, 2019Updated 6 years ago
- The repository contains important questions that are done in Coding Class and along with Aptitude PDF. Going through all set questions an…☆18Aug 5, 2023Updated 2 years ago
- e2e Scanning research module☆24Mar 26, 2026Updated 3 weeks ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Nov 29, 2025Updated 4 months ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Ground Station of ESP-VTX. Rewrite by Rust.☆21Jun 4, 2024Updated last year