luanpaschoal / pentaho-server-dockerView external linksLinks
Docker image for pentaho server 9 and container configuration
☆22May 10, 2020Updated 5 years ago
Alternatives and similar repositories for pentaho-server-docker
Users that are interested in pentaho-server-docker are comparing it to the libraries listed below
Sorting:
- Docker image for Pentaho BI server(community edition). https://hub.docker.com/r/zhicwu/biserver-ce/☆38Aug 3, 2019Updated 6 years ago
- Repository to centralize Pentaho containers initiative. Main goal is to have set of templates to use as starting point to help customers …☆21May 11, 2022Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Data Lake Engine☆13Dec 10, 2021Updated 4 years ago
- Qualys API samples and user documentation☆15Aug 14, 2019Updated 6 years ago
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Trend Micro XDR/Vision One Hunting Recipies☆17Apr 7, 2021Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Trend Vision One API cookbook sample code☆14Jan 29, 2026Updated 2 weeks ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- ☆19Jul 9, 2019Updated 6 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆23Mar 24, 2022Updated 3 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Process Injection: CreateRemoteThread☆26Dec 17, 2020Updated 5 years ago
- Export process for Bitcoin blockchain data to CSV☆25Sep 19, 2018Updated 7 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- ☆24Dec 7, 2022Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30May 21, 2019Updated 6 years ago
- Unofficial Python SDK for Zscaler☆38Jan 8, 2026Updated last month
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- ☆33Jan 11, 2018Updated 8 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 8 years ago
- ☆37Aug 8, 2021Updated 4 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆45Sep 28, 2020Updated 5 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Sep 23, 2015Updated 10 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 5 years ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Aug 22, 2025Updated 5 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆75Jan 19, 2026Updated 3 weeks ago
- CircuitPython DisplayIO Driver for ST7789 Color TFT Controller☆68Oct 20, 2025Updated 3 months ago
- 😂Simple FB Password Cracking Tool🤣☆88Apr 11, 2023Updated 2 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Oct 2, 2018Updated 7 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Grid plugin for jstree☆135Dec 2, 2020Updated 5 years ago