mikeroyal / Ansible-GuideLinks
Ansible Guide
☆17Updated 3 years ago
Alternatives and similar repositories for Ansible-Guide
Users that are interested in Ansible-Guide are comparing it to the libraries listed below
Sorting:
- VMware Guide☆13Updated 3 years ago
- Python Guide☆30Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- DevOps Guide☆13Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 2 months ago
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆21Updated 6 months ago
- A Networking Guide for getting started with basic/core network components such as wired and wireless network design, configuration, hard…☆75Updated 3 years ago
- Grafana Guide☆29Updated 3 years ago
- ☆21Updated 6 months ago
- ☆22Updated 8 years ago
- Puppet Guide☆10Updated 3 years ago
- SQL/NoSQL DB Guide. Learn about SQL/NoSQL databases & Distributed Systems.☆62Updated last year
- Open YARA scan- and search engine☆24Updated 5 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- THOR APT Scanner User Manual☆18Updated last week
- ☆48Updated last week
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆39Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 7 months ago
- ☆12Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆17Updated 3 weeks ago
- Docker Guide☆54Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year