mikeroyal / Ansible-GuideLinks
Ansible Guide
☆18Updated 3 years ago
Alternatives and similar repositories for Ansible-Guide
Users that are interested in Ansible-Guide are comparing it to the libraries listed below
Sorting:
- VMware Guide☆13Updated 4 years ago
- Python Guide☆32Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63Updated 5 years ago
- DevOps Guide☆14Updated 4 years ago
- Puppet Guide☆10Updated 3 years ago
- Bash/PowerShell Guide☆48Updated last year
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 6 months ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆12Updated last year
- ☆21Updated 4 years ago
- ☆18Updated 2 years ago
- Simulates a compromise in a cloud and container environment☆33Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆41Updated 11 months ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Updated 2 years ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆63Updated 2 years ago
- Hardened Windows Server image☆19Updated 6 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆22Updated 10 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- ☆12Updated 3 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Updated 4 years ago
- Training scenarios for cyber ranges☆13Updated 5 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆104Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago